Re: Network Solutions Crypt-PW Authentication-Scheme vulnerability

2001-06-11 Thread Wichert Akkerman
Previously Peter van Dijk wrote: crypt() passwords are never more than 8 characters - anything beyond 8 characters is discarded. That highly depends on the crypt implementation. The original crypt only used 8 characters, but modern implementations can use different schemes (md5 for example).

Re: Network Solutions Crypt-PW Authentication-Scheme vulnerability

2001-06-11 Thread Barney Wolff
Aside from using rand, which ain't worth much, perhaps it would be better to actually supply 64 chars for what's supposed to be a 64-byte array. You might even copy the real base64 encoding array, which is (A..Z,a..z,0..9,+,/). Barney Wolff On Fri, Jun 08, 2001 at 04:27:36PM -0700, Tyler Walden

Re: Network Solutions Crypt-PW Authentication-Scheme vulnerability

2001-06-10 Thread Chris Adams
Once upon a time, Peter Ajamian [EMAIL PROTECTED] said: While crypt password authentication is not in and of itself very secure, Network Sulotions have made it even less so by including the first two characters of the password as the salt of the encrypted form. While the This is not new; I

Re: Network Solutions Crypt-PW Authentication-Scheme vulnerability

2001-06-10 Thread Len Sassaman
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Fri, 8 Jun 2001, Peter Ajamian wrote: Do not use the Crypt-PW authentication-scheme. Instead use the MAIL_FROM or PGP scheme instead. Neither of these are very good options either. The problems with MAIL-FROM are the obvious flaws you find in

Re: Network Solutions Crypt-PW Authentication-Scheme vulnerability

2001-06-10 Thread Peter W
On Fri, Jun 08, 2001 at 12:37:34AM -0700, Peter Ajamian wrote: While crypt password authentication is not in and of itself very secure, Network Sulotions have made it even less so by including the first two characters of the password as the salt of the encrypted form. While the password is

Re: Network Solutions Crypt-PW Authentication-Scheme vulnerability

2001-06-10 Thread jkohl
On Fri, 08 Jun 2001 00:37:34 -0700 Peter Ajamian [EMAIL PROTECTED] wrote. Problem: While crypt password authentication is not in and of itself very secure, Network Sulotions have made it even less so by including the first two characters of the password as the salt of the encrypted form. While

Re: Network Solutions Crypt-PW Authentication-Scheme vulnerability

2001-06-10 Thread Peter van Dijk
On Fri, Jun 08, 2001 at 12:37:34AM -0700, Peter Ajamian wrote: [snip] computer. A new 1ghz computer could easily crank out 6 char passwords in mere seconds, 8 char passwords in a few hours, and a 10 char password probably in a week to a month or better. crypt() passwords are never more than

Re: Network Solutions Crypt-PW Authentication-Scheme vulnerability

2001-06-10 Thread Tyler Walden
For those interested here is perl program to generate Crypt-PW's with a propper salt. #!/usr/bin/perl $salt=salt(); print password encryptee, [CTRL]-D quits.\n; while (STDIN) { chop; $text=crypt($_,$salt); print $text.\n; } sub salt { local($salt); local($i, $rand); local(@itoa64) = ( 0

Re: Network Solutions Crypt-PW Authentication-Scheme vulnerability

2001-06-10 Thread Peter Ajamian
Peter W wrote: Plus when you submit a change request template, your email contains the plaintext password. :-( Changing your password means sending the cleartext value to NetSol via email. So changing your password involves risk. :-( In my recent experience, the unencrypted password is

Network Solutions Crypt-PW Authentication-Scheme vulnerability

2001-06-08 Thread Peter Ajamian
Problem: While crypt password authentication is not in and of itself very secure, Network Sulotions have made it even less so by including the first two characters of the password as the salt of the encrypted form. While the password is transmitted via a secure session, the encrypted form is

Re: Network Solutions Crypt-PW Authentication-Scheme vulnerability

2001-06-08 Thread aleph1
This is a very old problem. See http://www.securityfocus.com/archive/1/5494 (1996) http://www.securityfocus.com/archive/1/34191 (1999) NSI obviously does not care much about the security. I haven't been able to get PGP authentication working in months. -- Elias Levy SecurityFocus.com