Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
vOv
Feb 8, 2014

I remember seeing a tweet from some eBay support person saying that disabling the paste prevents brute force attacks, which... I don't even know how you get that confused.

Adbot
ADBOT LOVES YOU

Cup Runneth Over
Aug 8, 2009

She said life's
Too short to worry
Life's too long to wait
It's too short
Not to love everybody
Life's too long to hate


flosofl posted:

I feel like you missed a joke or something?

Yeah that seems sarcastic to me.

sarehu
Apr 20, 2007

(call/cc call/cc)
Not sarcastic at all. There are very obvious reasons why copy/pasting is disallowed when changing your password versus when logging in. If you can't think of them, try turning on your brain.

Cup Runneth Over
Aug 8, 2009

She said life's
Too short to worry
Life's too long to wait
It's too short
Not to love everybody
Life's too long to hate


Very obvious, that's why you're the only person in the thread who sees these obvious, definitely good reasons.

Rufus Ping
Dec 27, 2006





I'm a Friend of Rodney Nano
not tested chrome but firefox already disallows copying *from* a password field, so preventing people pasting into the 2nd one only fucks with innocent people

CLAM DOWN
Feb 13, 2007




sarehu posted:

Not sarcastic at all. There are very obvious reasons why copy/pasting is disallowed when changing your password versus when logging in. If you can't think of them, try turning on your brain.

You're trolling, right? Like, what are you talking about? What are the "very obvious reasons"?

Proteus Jones
Feb 28, 2013



sarehu posted:

Not sarcastic at all. There are very obvious reasons why copy/pasting is disallowed when changing your password versus when logging in. If you can't think of them, try turning on your brain.

LOL

sarehu
Apr 20, 2007

(call/cc call/cc)
Gee, maybe stop and consider why people have to type it twice.

CLAM DOWN
Feb 13, 2007




sarehu posted:

Gee, maybe stop and consider why people have to type it twice.

I....you cannot be serious. No one posting in an infosec thread is this dense.

Proteus Jones
Feb 28, 2013



CLAM DOWN posted:

I....you cannot be serious. No one posting in an infosec thread is this dense.

Oh, believe it. Try going to a conference for info-sec and be amazed at how a lot of "security engineers" cargo-cult their practices and policies. Most of them go through the motions without understanding WHY. It's all a ritual for the blessing of the security gods, whose ways are a mystery.

Proteus Jones fucked around with this message at 05:58 on Feb 26, 2017

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

CLAM DOWN posted:

I....you cannot be serious. No one posting in an infosec thread is this dense.

If you are familiar with his previous posts you would not be surprised. He is your typical HN commenter.

CLAM DOWN
Feb 13, 2007




flosofl posted:

Oh, believe it. Try going to a conference for info-sec and be amazed at how a lot of "security engineers" cargo-cult their practices and policies. Most of them go through the motions without understanding WHY.

I've been lucky, the last couple SANS conferences I've been to have been incredibly rewarding experiences for me but I can totally see what you're saying. I see it daily at work :(

OSI bean dip posted:

If you are familiar with his previous posts you would not be surprised. He is your typical HN commenter.

Ugh I wasn't aware

Cup Runneth Over
Aug 8, 2009

She said life's
Too short to worry
Life's too long to wait
It's too short
Not to love everybody
Life's too long to hate


I still don't get how that makes it easy to gently caress up a copy/pasted password??

I mean obviously it's tripe. But I don't understand the internal logic either.

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

Cup Runneth Over posted:

I still don't get how that makes it easy to gently caress up a copy/pasted password??

I mean obviously it's tripe. But I don't understand the internal logic either.

Sarehu is demonstrating that he has no idea about how passwords should be handled in an application and would rather tell us that we are "missing the obvious" instead of actually elaborating on his (idiotic) point.

sarehu
Apr 20, 2007

(call/cc call/cc)
Users will gently caress up the copy/paste and cost money getting customer support and complaining on Yelp.

Volguus
Mar 3, 2009

sarehu posted:

Users will gently caress up the copy/paste and cost money getting customer support and complaining on Yelp.

As opposed to being forced to type in a weak password that will be easily guessed and then cost money getting customer support to un-gently caress their account and complain on Yelp.

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

sarehu posted:

Users will gently caress up the copy/paste and cost money getting customer support and complaining on Yelp.

How often do you run across users who are the type to whine on Yelp that also copy and paste passwords?

CLAM DOWN
Feb 13, 2007




sarehu posted:

Users will gently caress up the copy/paste and cost money getting customer support and complaining on Yelp.

As opposed to the customer service cost of making people type their own complex passwords repeatedly? Or do you advocate for simple short passwords as well?

Proteus Jones
Feb 28, 2013



sarehu posted:

Users will gently caress up the copy/paste and cost money getting customer support and complaining on Yelp.

Lol, this is good. You really had me thinking you were actually this stupid.

susan b buffering
Nov 14, 2016

Lmao @ the idea of people reviewing websites on yelp. Is that even possible?

Furism
Feb 21, 2006

Live long and headbang

gallop w/a boner posted:

Within my organisation, we use an application white-listing product (Appsense Application Manager) on all Windows endpoints. We only allow pre-approved applications and block scripting engines like cscript.exe, powershell.exe etc. We do not allow executables to run from anywhere in the user's profile, network drives etcetera. We haven't had a single malware infection (well, as far as we know) since implementing white-listing, and are generally pretty pleased with it.

We recently had a sales meeting with a security vendor. They told us that app-whitelisting technologies were now ineffective, because new toolkits such as 'PowerShell Empire' can execute on a system without needing an actual .exe file to be written to the file system and then executed somehow.

I am trying to understand how accurate this statement is.

I've read various bits about PowerShell Empire and the different staging methods, such as DLL injection, but they all seem to rely on powershell.exe or at least some sort of executable running at some point.

Can someone help me understand this? My background is in general IT ops, so apologies if I have misunderstood anything.

I'm still trying to sort out the truth vs FUD about this but yeah apparently fileless malware is a thing now. I think the usual "train your employees" argument is still the best counter to that ; but still, as we know if you get specifically targeted you will be fooled/infected eventually given enough resources.

I reckon the usual DLP mitigation technologies still work for fileless malware. I mean, we know anti-virus are pretty much useless now and they can actually make your systems less secure because they increase the attack surface but you still have to handle the malwares and nowadays doing it at the network layers seem to be the way to go. Some people are trying to come up with Machine Learning technologies to detect anomalies on the network, for instance. In any case, I don't see how fileless malware change the game (except you can't scan for files, but like I said this way of detecting malware is probably out of date now).

Just out curiosity, what's this vendor solution to that?

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

skull mask mcgee posted:

Lmao @ the idea of people reviewing websites on yelp. Is that even possible?

https://www.yelp.com/biz/something-awful-pleasant-hill

susan b buffering
Nov 14, 2016


If only Lowtax would disable copy-pasting into the change password field, that rating would be a good two stars higher.

FreelanceSocialist
Nov 19, 2002

Kassad posted:

Also: Don't upload a pair of files with identical SHA-1 to a SVN repository, turns out this corrupts them.

Oh man, that just made Monday morning so much better.

some kinda jackal
Feb 25, 2003

 
 
The most baffling disabling copy/paste is Namecheap's SMS "MFA" implementation. They won't let you paste into the textbox for the code.

Not that typing in those digits is annoying, but the fact that they thought this was the hill to die on. Were people pasting in from Messages.app really that big a threat? :haw:

Last Chance
Dec 31, 2004

sarehu posted:

It's so easy to gently caress up a copy/pasted password so making you type it makes a lot of sense.

You're a dipshit

sarehu
Apr 20, 2007

(call/cc call/cc)

CLAM DOWN posted:

As opposed to the customer service cost of making people type their own complex passwords repeatedly? Or do you advocate for simple short passwords as well?

Yeah, make your passwords short, and different for each website. The length doesn't help -- if somebody's hacked the website, they'll probably get everything else in the database too, and a targeted crack isn't going to matter much.

RFC2324
Jun 7, 2012

http 418

sarehu posted:

Yeah, make your passwords short, and different for each website. The length doesn't help -- if somebody's hacked the website, they'll probably get everything else in the database too, and a targeted crack isn't going to matter much.

:chanpop:

Last Chance
Dec 31, 2004


Yeah, has to be a troll.

CLAM DOWN
Feb 13, 2007




sarehu posted:

Yeah, make your passwords short, and different for each website. The length doesn't help -- if somebody's hacked the website, they'll probably get everything else in the database too, and a targeted crack isn't going to matter much.

Honestly I think my recommendation here is that you stop using a computer now and forever

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

The only things that matter are reuse, and making sure the search space is large enough that your anti-brute-force system kicks in before they have a decent chance.

To prevent reuse, pick 3 random characters at password set time and require them to be in the password. (Or take the password and try it on a bunch of sites in the background.)

Thanks Ants
May 21, 2004

#essereFerrari


sarehu posted:

The length doesn't help

;-*

sarehu
Apr 20, 2007

(call/cc call/cc)
It's very easy to test my hypothesis. Take my 8 characters-and-less passwords on websites I use (they go down to 6), count how many times my accounts have been lost from the password being hacked, and compare the results with your however-long passwords that make you feel secure.

I've never lost any account to somebody brute forcing my password over the wire. Or from anybody getting the password database and cracking it offline. That would be doable, but there's minimal harm that could be done on any service for which that could be accomplished.

Cup Runneth Over
Aug 8, 2009

She said life's
Too short to worry
Life's too long to wait
It's too short
Not to love everybody
Life's too long to hate


It's never backfired on me, therefore it is good security practice.

Proteus Jones
Feb 28, 2013



Just ignore the troll. There's no way anyone can be this willfully stupid and still be functional enough to use a computer without a helper.

Boris Galerkin
Dec 17, 2011

I don't understand why I can't harass people online. Seriously, somebody please explain why I shouldn't be allowed to stalk others on social media!
My 1Password Watchtower/heartbleed tab has like 30+ websites listed as vulnerable. A lot of them are one off accounts I made to buy something or whatever that 1Password saved (I mean really do I "need" to update my account at "jetpens.com"? Whatever address i saved there isn't even where i live anymore and I'm sure the credit card is either expired or if not then well I know I'm not gonna be on the hook if someone steals it so who cares), and the others are websites that make it really difficult for me to change my password/can't login anymore without :effort:.

My point is that passwords are annoying. You should still use password managers though. They help except when they don't (e.g. maximum arbitrary password lengths).

Furism
Feb 21, 2006

Live long and headbang
Passwords are terrible but they are the least we can do. I mean, door keys are terrible too but there's not much choice there. Passwords wouldn't be half as bad if most websites set up a proper 2FA. It still wouldn't be perfect but much better.

Personally I'm waiting for more news on SQRL. I'd like to see some security research done on this and cryptographic attacks, peer reviews, etc. Using a public key to log on a website, and specific to that website, is pretty cool.

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

Furism posted:

Passwords are terrible but they are the least we can do. I mean, door keys are terrible too but there's not much choice there. Passwords wouldn't be half as bad if most websites set up a proper 2FA. It still wouldn't be perfect but much better.

Personally I'm waiting for more news on SQRL. I'd like to see some security research done on this and cryptographic attacks, peer reviews, etc. Using a public key to log on a website, and specific to that website, is pretty cool.

SQRL is garbage:
http://security.blogoverflow.com/2013/10/debunking-sqrl/

Also Steve Gibson is a loving charlatan, so stop reading up on his dumbassery:
http://attrition.org/errata/charlatan/steve_gibson/

Proteus Jones
Feb 28, 2013



OSI bean dip posted:

SQRL is garbage:
http://security.blogoverflow.com/2013/10/debunking-sqrl/

Also Steve Gibson is a loving charlatan, so stop reading up on his dumbassery:
http://attrition.org/errata/charlatan/steve_gibson/

Wait, he's still around? I thought he faded into obscurity a decade ago when people finally figured out he was full of poo poo and didn't know what he was talking about.

I still remember his "artisanal" programs, hand-crafted in x86 asm.

Adbot
ADBOT LOVES YOU

pr0zac
Jan 18, 2004

~*lukecagefan69*~


Pillbug

Furism posted:

Passwords are terrible but they are the least we can do. I mean, door keys are terrible too but there's not much choice there. Passwords wouldn't be half as bad if most websites set up a proper 2FA. It still wouldn't be perfect but much better.

Personally I'm waiting for more news on SQRL. I'd like to see some security research done on this and cryptographic attacks, peer reviews, etc. Using a public key to log on a website, and specific to that website, is pretty cool.

Looking into it (and ignoring that, like OSI said, Gibson is an idiot that should be ignored) it seems like SQRL would be a replacement for the SMS based portion of a good multi-factor authentication system, not for passwords. Pub/priv key based signing is a "thing you have" auth check, passwords are a "thing you know" auth check. Yes, the key is protected by a password as well, but verifying the password isn't done by the system being authenticated against so it shouldn't be considered an auth mechanism.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply