Stories
Slash Boxes
Comments

SoylentNews is people

posted by cmn32480 on Wednesday February 28 2018, @03:03PM   Printer-friendly
from the now-I-have-to-change-the-code-on-my-luggage dept.

A new system that securely checks whether your passwords have been made public in known data breaches has been integrated into the widely used password manager, 1Password. This new tool lets customers find out if their passwords have been leaked without ever transmitting full credentials to a server.

Security researcher Troy Hunt this week announced his new version of "Pwned Passwords," a search tool and list of more than 500 million passwords that have been leaked in data breaches. Users can access it online and developers can connect applications to it via an API.

Within a day, the company AgileBits had integrated Hunt's new tool into the 1Password password manager. AgileBits' announcement describes how it works:

Troy's new service allows us to check your passwords while keeping them safe and secure. They're never sent to us or his service.

First, 1Password hashes your password using SHA-1. But sending that full SHA-1 hash to the server would provide too much information and could allow someone to reconstruct your original password. Instead, Troy's new service only requires the first five characters of the 40-character hash.

To complete the process, the server sends back a list of leaked password hashes that start with those same five characters. 1Password then compares this list locally to see if it contains the full hash of your password. If there is a match then we know this password is known and should be changed.

Source: https://arstechnica.com/information-technology/2018/02/new-tool-safely-checks-your-passwords-against-a-half-billion-pwned-passwords/


Original Submission

This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
(1)
  • (Score: 0) by Anonymous Coward on Wednesday February 28 2018, @03:08PM (7 children)

    by Anonymous Coward on Wednesday February 28 2018, @03:08PM (#645169)

    Just think, if the list of leaked passwords was *much* longer, it would approach all the possible combinations (up to some character length)...at which point the scan would take as long as if there were no leaked passwords.

    • (Score: 4, Funny) by Runaway1956 on Wednesday February 28 2018, @03:19PM (4 children)

      by Runaway1956 (2926) Subscriber Badge on Wednesday February 28 2018, @03:19PM (#645175) Journal

      This is for sissies anyway. I just type my passwords into Google, to see which ones have been leaked.

      • (Score: 2, Funny) by Anonymous Coward on Wednesday February 28 2018, @04:10PM (2 children)

        by Anonymous Coward on Wednesday February 28 2018, @04:10PM (#645209)

        I did the same thing:

        hunter2
        About 3,450,000 results (0.23 seconds)

        • (Score: 2) by DeathMonkey on Wednesday February 28 2018, @07:12PM (1 child)

          by DeathMonkey (1380) on Wednesday February 28 2018, @07:12PM (#645317) Journal

          Security through obscurity?

          • (Score: 1, Funny) by Anonymous Coward on Wednesday February 28 2018, @08:56PM

            by Anonymous Coward on Wednesday February 28 2018, @08:56PM (#645392)

            Uh, have you SEEN runaway's password?

            It's security through obscenity.

      • (Score: -1, Spam) by Anonymous Coward on Wednesday February 28 2018, @04:14PM

        by Anonymous Coward on Wednesday February 28 2018, @04:14PM (#645212)

        The woman spasmed and gurgled. The man, who had firmly believed she was dead, became furious. Why was this woman - this monster - clinging to life in utter defiance of a man!? The man became frightened of the monster, but then realized that the only way to end oppression was to fight back against it. He gathered his courage and then pummeled her with his fists until every last scrap of motion was taken from her.

        However, even after emerging victorious, the psychological scars the woman inflicted upon the man remained yet still. Some might wonder: Will men's rights ever be respected?

    • (Score: 0) by Anonymous Coward on Wednesday February 28 2018, @04:33PM

      by Anonymous Coward on Wednesday February 28 2018, @04:33PM (#645234)

      Not if the list is sorted. Hint: Binary search.

    • (Score: 2) by Immerman on Wednesday February 28 2018, @04:48PM

      by Immerman (3985) on Wednesday February 28 2018, @04:48PM (#645244)

      Considering that there are well over 56 billion possible 6-character passwords (using just numbers and upper- and lower-case English letters), somehow I suspect that even a leak of every password ever used by anyone for any purpose would *still* drastically reduce the search-space.

  • (Score: 2) by Bot on Wednesday February 28 2018, @03:33PM (3 children)

    by Bot (3902) on Wednesday February 28 2018, @03:33PM (#645185) Journal

    > Security researcher Troy Hunt
    looks totally legit

    --
    Account abandoned.
    • (Score: 0) by Anonymous Coward on Wednesday February 28 2018, @03:54PM (1 child)

      by Anonymous Coward on Wednesday February 28 2018, @03:54PM (#645197)

      Sounds better than Mike Hunt anyway.

      • (Score: 0) by Anonymous Coward on Wednesday February 28 2018, @05:29PM

        by Anonymous Coward on Wednesday February 28 2018, @05:29PM (#645268)

        Or Dick Hertz, or Ray Gunn, or Erasmus B. Draggin..

    • (Score: 0) by Anonymous Coward on Wednesday February 28 2018, @04:23PM

      by Anonymous Coward on Wednesday February 28 2018, @04:23PM (#645226)

      I thought Troy Hunt was Heinrich Schliemann's pseudonym!

  • (Score: 3, Insightful) by requerdanos on Wednesday February 28 2018, @04:19PM (2 children)

    by requerdanos (5997) Subscriber Badge on Wednesday February 28 2018, @04:19PM (#645222) Journal

    Find Out If Your Password Has Been Pwned—Without Sending It to a Server

    Yeah, you just type it here, and it shows up as *'s. Example: *******

    • (Score: 0) by Anonymous Coward on Wednesday February 28 2018, @06:59PM (1 child)

      by Anonymous Coward on Wednesday February 28 2018, @06:59PM (#645307)

      So, this should show up as *s then, right?

            hunter2

      Did that work?

      • (Score: 2) by requerdanos on Wednesday February 28 2018, @07:29PM

        by requerdanos (5997) Subscriber Badge on Wednesday February 28 2018, @07:29PM (#645329) Journal

        So, this should show up as *s then, right?

                    hunter2

        Did that work?

        I don't understand. Are you just putting *'s, or is that the password? It says "*******" here.

  • (Score: 2) by Nerdfest on Wednesday February 28 2018, @04:31PM (3 children)

    by Nerdfest (80) on Wednesday February 28 2018, @04:31PM (#645231)

    I'm sure this would work just fine, but I'd have to start using passwords longer than five characters. Next thing you know they'll want us to start using uppercase letters and numbers.

    • (Score: 1) by Sulla on Wednesday February 28 2018, @04:43PM (1 child)

      by Sulla (5173) on Wednesday February 28 2018, @04:43PM (#645242) Journal

      I have heard rumor that some services are considering requiring special characters and numbers.

      Verily, this has gone too far.

      --
      Ceterum censeo Sinae esse delendam
      • (Score: 0) by Anonymous Coward on Wednesday February 28 2018, @05:26PM

        by Anonymous Coward on Wednesday February 28 2018, @05:26PM (#645264)

        Just wait. Soon they will require one character from U+0100-U+0FFF, one from U+1000-U+FFFF, and one from U+10000 and above.

    • (Score: 3, Informative) by pipedwho on Wednesday February 28 2018, @09:49PM

      by pipedwho (2032) on Wednesday February 28 2018, @09:49PM (#645422)

      There's no need to use anything but lower case letters if your password is long enough.

      Sites that require certain characters (eg. at least 1 number, 1 upper case, etc) are less secure IMO, because they encourage people to use shorter passwords, most of which simple do the 'leet speak' replacement, which doesn't add much entropy to your password, while at the same time making it harder to remember.

      Even worse are places that make you change your password periodically (eg. every 3 or 6 months). Dictionary attacks on password databases in those organisations find numerous passwords easily if they already have a previously compromised password. Simply because the vast majority of people use simple permutations of extra digits on their 'base' password (which is already of low entropy as they are now recommitting a newish password to memory each time, rather than spending the effort to memorise something longer and more secure). Far better is a company that only requires a password change if an 'exposure' occurs. Then people know to abandon the old password and create something new - hopefully that they can keep 'indefinitely' unless another hack occurs.

      Even NIST's current password policy recommendations explicitly say to avoid: password expiry, upper end length limits (within reason), and requiring obscure characters. They do recommend increasing the minimum length beyond the usual 6-8 characters.

  • (Score: 1, Funny) by Anonymous Coward on Wednesday February 28 2018, @04:34PM (4 children)

    by Anonymous Coward on Wednesday February 28 2018, @04:34PM (#645235)

    ********************************* that's right, just a bunch of stars. Put that in your cracker and watch your box smoke while it tries endless combinations of letters, numbers, symbols, and words. Fuck your dictionary!

    • (Score: 5, Funny) by realDonaldTrump on Wednesday February 28 2018, @05:01PM (2 children)

      by realDonaldTrump (6614) on Wednesday February 28 2018, @05:01PM (#645255) Homepage Journal

      People don't read the stories, nobody reads the stories here. Especially not the ones about cyber. Because cyber is hard. And to be perfectly honest with you, I didn't read this story. I read the story, I read it somewhere else. And the list comes from websites -- and other kinds of cyber -- that have been hacked. So even people that picked a VERY SMART password, their cyber can get onto that list. If they use that password on a website and THE WEBSITE gets hacked. Nobody hacked the password, it was a great password. But the WEBSITE had VERY DUMB administrators. And after the website is hacked, very easy to get the passwords. Even the best ones. Meaning, they hacked the password. No matter what it was. Somebody goes to the hacked website, maybe they go to another website too. And use the same password. Everybody does it, right? But the hacker KNOWS that password. Because he hacked the first site, he hacked that password. So, use that password on the 2nd website, it's a hacked password. And the hacker can get in without hacking the 2nd website. Modern cyber is a minefield, folks. You're like a great and very brave soldier.

      • (Score: 3, Insightful) by DeathMonkey on Wednesday February 28 2018, @07:15PM (1 child)

        by DeathMonkey (1380) on Wednesday February 28 2018, @07:15PM (#645318) Journal

        Maybe you should have your nephew look into it. I heard he's real good at cyber.

        • (Score: 2) by realDonaldTrump on Wednesday February 28 2018, @10:52PM

          by realDonaldTrump (6614) on Wednesday February 28 2018, @10:52PM (#645462) Homepage Journal

          Not my nephew Fred III, he went into real estate. And always had big problems with his health. The cerebral palsy, very expensive. Very sad, it was going to bankrupt the whole family, big lawsuit. But we settled that one very amicably. That's why I promised the American people, we’re going to have insurance for everybody. There was a philosophy in some circles that if you can’t pay for it, you don’t get it. That’s not going to happen with us.

          My little brother Robert went into cyber, into the cyber games. You've heard of the Id games, right? He bought that one, it's ZeniMax now.

          But my son, my youngest son, Bannon, he's the master of it. So good with computer! And he explains it so well. Much better than our Fake News MSM!

    • (Score: 2) by inertnet on Wednesday February 28 2018, @06:34PM

      by inertnet (4071) on Wednesday February 28 2018, @06:34PM (#645294) Journal

      Ah, but my box wouldn't have to smoke if I just use tried those 500 million passwords instead of endless combinations of stuff. I'd be hitting a substantial percentage of every password used worldwide, just with that half a billion of them.

  • (Score: 2) by pkrasimirov on Wednesday February 28 2018, @07:31PM

    by pkrasimirov (3358) Subscriber Badge on Wednesday February 28 2018, @07:31PM (#645331)

    Fnord666 Awesome, thank you!

(1)