this post was submitted on 30 Sep 2023
156 points (73.9% liked)

Programming

17518 readers
483 users here now

Welcome to the main community in programming.dev! Feel free to post anything relating to programming here!

Cross posting is strongly encouraged in the instance. If you feel your post or another person's post makes sense in another community cross post into it.

Hope you enjoy the instance!

Rules

Rules

  • Follow the programming.dev instance rules
  • Keep content related to programming in some way
  • If you're posting long videos try to add in some form of tldr for those who don't want to watch videos

Wormhole

Follow the wormhole through a path of communities [email protected]



founded 1 year ago
MODERATORS
 

This thread is frustrating. Everyone seems more interested in nitpicking the specifics of what OP is saying and are ignoring that a forum sends you your password (not an automatically generated one) in an email on registration.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 90 points 1 year ago (5 children)

Just wow, yeah. Nothing should ever send you a password in cleartext - once that's been done, a MITM attack's success rate just went to 100%.

It's painless to use password resets if the person forgot the password. Never, ever should a password be in cleartext.

hunter2

[–] [email protected] 88 points 1 year ago (1 children)

Why did you put a bunch of asterisks at the bottom of your post?

[–] [email protected] 35 points 1 year ago (1 children)

I'm delighted you get the reference!

[–] [email protected] 2 points 1 year ago (1 children)

I'd be more worried if someone who uses the internet to such a degree that they use Lemmy over Reddit, on a programming forum, didn't get the reference. This is famous hacker lore at this point.

[–] [email protected] 1 points 1 year ago (1 children)

Can you be worried for me, and fill me in?

[–] [email protected] 2 points 1 year ago (1 children)
[–] [email protected] 1 points 1 year ago

Oh, I’ve seen people do that crap on RuneScape back in the day. Not sure I’ve ever seen the meme though.

[–] [email protected] 8 points 1 year ago* (last edited 1 year ago)

An issue if you’re reusing passwords. If not, every forgot my password email is also vulnerable.

A combination of bad practices could be… bad.

Edit: apparently around the same time, their forum was also lacking https. This would be an even easier vector.

[–] [email protected] 4 points 1 year ago* (last edited 1 year ago) (2 children)

It’s painless to use password resets

Ya and have they send you the (one-time) password in cleartext

[–] [email protected] 5 points 1 year ago (1 children)

(one-time)

You make it sound like an irrelevant detail, but that's kind of the key part. If implemented properly, it's only valid once and for a short period of time, which greatly reduces risk.

[–] [email protected] 2 points 1 year ago

Sure. I just want to point out that there is valid case when passwords are sent in clear text.

[–] [email protected] 3 points 1 year ago (3 children)

In my experience it's always a tokenized link, no clear text required.

[–] [email protected] 15 points 1 year ago

Well, the tokenized link is essentially a clear text one time password. Not really any better than just a one time password except for the convenience that the user does not need to type it in. If someone gets hold of the link or password before you they can get access to your account.

[–] [email protected] 7 points 1 year ago

I don't see how's either way better or worse as long as they force you to change the password upon login

[–] [email protected] 4 points 1 year ago

And what is the token in the link?

[–] [email protected] 3 points 1 year ago (1 children)

Many years ago, I had forgotten my password to the Sprint websiteb so I could log in and pay my cellular bill. I had to call customer support to resolve this. After verifying my activity, the support agent read me my existing password one letter at a time. While this was alarming, I was amused she had to spell out a somewhat obscene phrase for me. This was maybe 20 years ago and I no longer use Sprint.

[–] [email protected] 3 points 1 year ago

I no longer use Sprint

I mean, nobody else does either.

[–] [email protected] -2 points 1 year ago (1 children)

MITM attack's success rate just went to 100%

No, it didn't. It's stupid and shouldn't be done, but all ham nowadays is encrypted.

I know that because I've been running my email server for some years now, technically breaking one of the RFCs for not allowing unencrypted connections. Zero email has been missed.

[–] [email protected] 6 points 1 year ago (1 children)

While I agree that likely most SMTP traffic is sent encrypted these days, you simply cannot be sure. Just because you received something over an encrypted connection doesn't mean that relays in between also used this. The webserver could have handed over the email unencrypted to an SMTP server for all you know. And even if an encrypted connection was used the mail might still have been copied to a log on the SMTP server. Email is unfortunately inherently unsafe.

[–] [email protected] 2 points 1 year ago

Fair point. Although it's very rare to have actual 3rd party relays in path.