Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security Ubuntu

Ubuntuforums.org Hacked 146

satuon writes "The popular Ubuntu Forums site is now displaying a message saying there was a security breach. What is currently known: Unfortunately the attackers have gotten every user's local username, password, and email address from the Ubuntu Forums database. The passwords are not stored in plain text. However, if you were using the same password as your Ubuntu Forums one on another service (such as email), you are strongly encouraged to change the password on the other service ASAP. Ubuntu One, Launchpad and other Ubuntu/Canonical services are NOT affected by the breach."
This discussion has been archived. No new comments can be posted.

Ubuntuforums.org Hacked

Comments Filter:
  • Password policy (Score:5, Interesting)

    by readingaccount ( 2909349 ) on Sunday July 21, 2013 @02:12AM (#44340457)

    The passwords are not stored in plain text

    You'd hope so. That would be standard policy you'd assume by now (hashes are easy), but apparently it's still important to mention this given there are still way too many outfits storing plain-text passwords in their systems.

    I remember reading the following advice - if you're unsure about the security of any company with whom you've got a password-secured account with, just check to see if they have some kind of password recovery link on their login page. Normally these links should email you with a temporary password so you can make a new one, but if they happen actually email you with your actual password... RUN!!!

  • Re:Ummm... (Score:5, Interesting)

    by davetv ( 897037 ) on Sunday July 21, 2013 @02:14AM (#44340467)
    I wonder when they are going to email the userbase with this announcement. I have received no email from them. Perhaps the hacker could alert the userbase as a community spirited gesture.
  • by tlhIngan ( 30335 ) <slashdot.worf@net> on Sunday July 21, 2013 @02:45AM (#44340571)

    The "strongly encouraged to change the password on the other service" bit is perhaps an open admission that they didn't salt; or maybe it's an admin lacking knowledge of the salt/no-salt situation and playing it safe by warning users. Still disappointing.

    No, because cracking passwords, even salted one, is ridiculously easy. Hell, take a well salted database, a stolen password list, and a way to compute the password. You can probably find a good chunk of accounts with the basic set of passwords.

    Salting just prevents the use of rainbow tables, which means cracking passwords takes a few hours instead of a few seconds. Hell, you probably could use one of those bitcoin miner ASICs to do it - cracking passwords is really just computing hashes, and the R&D in computing hashes faster and faster means hashed and salted passwords are getting easier to crack.

    Ars Technica details it better.
    http://arstechnica.com/security/2013/03/how-i-became-a-password-cracker/ [arstechnica.com]

    http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/ [arstechnica.com]

  • by Rockoon ( 1252108 ) on Sunday July 21, 2013 @05:38AM (#44340931)
    Salting helps against rainbow tables, but its irrelevant to the integrity of the password itself.

    The important thing is that the hash is lossy so that even if salt+"abc613" hashes to the value in the database, that there is no reason to believe that "abc613" was actually the password the user was using.. He could have been using "manbearpig", for example. This is a case where longer hash values actually helps the hacker/cracker.

    I dont pretend to know what the optimal size of the stored hash should be in order to protect the users passwords, but I think its almost certainly less than 32 bits. 32-bits is wide enough that attempting to find a hash collision at the login prompt is still silly, while also making the information gleaned from a brute force attack of the hash values almost useless.
  • Re:Ummm... (Score:2, Interesting)

    by Anonymous Coward on Sunday July 21, 2013 @06:00AM (#44341005)

    Ubuntu forum sounds like the Linux Mint forum - can never change password, or much else that matters. I recall registering on Ubuntu, so I had better check on this!

    BTW, I have reason to suspect that LM forum has also been hacked - at least 3 months ago. An email address that never got spam and was used to register there, is starting to collect spam....

Math is like love -- a simple idea but it can get complicated. -- R. Drabek

Working...