Hacker News new | past | comments | ask | show | jobs | submit login

Or for an unhashed password database, c.f. http://plaintextoffenders.com/.



The fact that your password is mailed in plain text to you when you register does not prove the password is not hashed when it's stored.

In a "lost password" mail, of course, that's another thing.


A moot point. If they are sending your password across anything in plaintext, you just immediately lost a lot of the advantage you got from storing the password hashed.


If they can hack into your mail they can reset your password anyway.

(I'm not being technically correct here, but I'm being practical, and my argument here applies to 99.9999% of all cases)


It's not about hacking your email even. A significant amount of SMTP traffic still goes around unencrypted so just seeing that traffic fly by is enough to get the password.


A one-time password system should also have a second token that was sent to the browser as a cookie over SSL. When the link is clicked the browser sends both tokens (the cookie and the OTP) together. The password is only valid for one browser. Also the OTP should expire after a short time. [1] It has the same security properties as a federated identity service like OpenID (except that it is less vulnerable to phishing.)

Of course if you're talking about just a normal plain text static password, then it's obviously wrong to see it in an email.

[1] "Simple Authentication for the Web" (2007) https://isrl.byu.edu/pubs/saw_TechReport%20%28revised%20Marc...


But the mail is stored!


Arguably, sending a one-time password over email in plaintext isn't a disaster. It's stored, fine, but it's no less secure than the user's email account (that you were going to reset to anyway). If internal storage on the site is still responsible, it's not a huge concern.

Of course, a truly healthy system also wouldn't allow email-only resets, but that's life.


Fortunately, the mail is not typically stored in the user database, so acquiring it would take at least a separate leak.


By you, right? Or is it common practice to store outgoing mails?


You could always not store password reset emails.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: