Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security IT

LinkedIn Password Leak: Salt Their Hide 192

CowboyRobot writes "Following yesterday's post about Poul-Henning Kamp no longer supporting md5crypt, the author has a new column at the ACM where he details all the ways that LinkedIn failed, specifically related to how they failed to 'salt' their passwords, making them that much easier to crack. 'On a system with many users, the chances that some of them have chosen the same password are pretty good. Humans are notoriously lousy at selecting good passwords. For the evil attacker, that means all users who have the same hashed password in the database have chosen the same password, so it is probably not a very good one, and the attacker can target that with a brute force attempt.'"
This discussion has been archived. No new comments can be posted.

LinkedIn Password Leak: Salt Their Hide

Comments Filter:
  • Re:Faulty Logic (Score:4, Informative)

    by ProDeveloper ( 2657899 ) on Friday June 08, 2012 @01:07PM (#40259427)
    Exactly. Both the summary and article are being stupid about the reason for salting in hashed passwords. It's main benefit isn't hiding two same password. It's main purpose is to make brute force much more work, even if the user supplied short password. Even Google isn't stupid enough to pull stuff like that. The salt should consist of general site wide salt, and personal salt calculated from user values that do not change (UID, birth date, some extra field in db).
  • by Anonymous Coward on Friday June 08, 2012 @01:11PM (#40259515)

    Do they understand how hashes work?

    Yes, Poul-Henning Kamp understand how hashes work. Much, much, much better than you do. But if you feel compelled to lecture the writer of MD5crypt on your wonderful insights into how hashes work, please, feel free.

  • by sideslash ( 1865434 ) on Friday June 08, 2012 @01:21PM (#40259655)
    If you've used the same password at multiple sites, you've already exposed yourself to cross-site mischief if one was compromised. LinkedIn looks bad right now, but you know there are a lot of sites that store passwords in plaintext.
  • Re:Faulty Logic (Score:5, Informative)

    by Goaway ( 82658 ) on Friday June 08, 2012 @01:49PM (#40260095) Homepage

    Salting does not make brute forcing one password more work. It does make bruteforcing a list of passwords more work, however.

Nothing is finished until the paperwork is done.

Working...