AOL's Embarassing Password Woes 192
An anonymous reader writes "AOL.com users may think they have up to sixteen characters to use as a password, but they'd be wrong, thanks to this security artifact detailed by The Washington Post's Security Fix blog:
"Well, it turns out that when someone signs up for an AOL.com account, the user appears to be allowed to enter up to a 16-character password. AOL's system, however, doesn't read past the first eight characters."
This means that a user who uses "password123" or any other obvious eight-character password with random numbers on the end is in effect using just that lame eight-character password."
Nothing new (Score:4, Interesting)
Re:Nothing new (Score:4, Informative)
Real VNC 4 (Score:2, Informative)
Re: (Score:2, Informative)
So I dumped the convoluted password and went with something with 8 characters.
Not alone (Score:5, Informative)
One thing I find interesting though, way back before the internet was well known (1990 or so I think) and people paid for CompuServe or AOL or whatever, I had a CompuServe account and the original password was 'wrote*admiral' and it definatly required all letters to be correct
Re: same in the default install of solaris 10 (Score:5, Informative)
Re:Not alone, Apple too (Score:5, Interesting)
Ditto NT4. Sort of. (Score:2, Informative)
Worth remembering if you still have any NT4 servers in production.
Re:Ditto NT4. Sort of. (Score:5, Informative)
The Lanmanager hashing system breaks the password up into two 7-char sized chunks, converts them to upper case, and hashes each separately, and XP still uses Lanmanager hashes if you don't explicitly tell it not to (by changing a registry setting).
The first 14 characters are still used in Lanmanager hashes though, so this is only a security hole if the attacker can access the hashes.
Re: (Score:2)
And don't the hashes fly across the network in the clear (unless you are using Kerberos in a non-compatibility mode?)?
Re: (Score:2)
I had to time limit that program because if you just let it process overnight it found *every* password including the 'secure' admin one...
Re: (Score:2)
Yup. HPUX (10.20, and maybe 11.00 - can't recall) did the same thing.
Re: (Score:2, Insightful)
Re: (Score:2)
Re:Not alone (Score:5, Informative)
Re: (Score:3, Informative)
Re:Not alone (Score:4, Informative)
#
#PASS_MAX_LEN 8
MD5_CRYPT_ENAB yes
@yg
Re: (Score:2, Informative)
Re: (Score:3, Informative)
Re: (Score:2)
Forgive me if I'm being a spaz, but isn't that line commented out in your example? It also seems to be commented out on my Gentoo box, which leads me to believe that it's commented out by default as it's a file I've never touched.
Furthermore I tried su'ing on that machine with only the first eight characters of my root password, and was denied access. So I'm concluding that it's not a problem in Gentoo by default.
Re:Not alone (Score:5, Informative)
# Number of significant characters in the password for crypt().
# Default is 8, don't change unless your crypt() is better.
# Ignored if MD5_CRYPT_ENAB set to "yes".
#
#PASS_MAX_LEN 8
# If set to "yes", new passwords will be encrypted using the MD5-based
# algorithm compatible with the one used by recent releases of FreeBSD.
# It supports passwords of unlimited length and longer salt strings.
# Set to "no" if you need to copy encrypted passwords to other systems
# which don't understand the new algorithm. Default is "no".
#
MD5_CRYPT_ENAB yes
Re: (Score:2)
Standard crypt problem (Score:5, Interesting)
We switched to a new content management system and gleefully informed users that their new default password was (an organization-standard eight-character string) followed by their username.
We realized something was wrong when someone noticed that all the password hashes were the same.
(The fix: find a new better hash function.)
Re: (Score:2, Redundant)
Re: (Score:3, Funny)
http://www.mspong.org/cyclopedia/cookery.html#hash ed_beef [mspong.org]
Re: (Score:2)
Re: (Score:2)
That's YOUR password? (Score:2)
Re:That's YOUR password? (Score:5, Funny)
That's ok, I logged in and changed it for you. :-)
Re: (Score:2)
Spelling (Score:2, Informative)
Re:Spelling (Score:4, Funny)
I spent all day yesterday giggling at "eLfavirenz" (its efavirenz- no L). While HIV/AIDS is far from a humorous disease, images of brazilian midgets with big ears and curl-toed shoes sneaking around with big bottles of pirated protease inhibitors kept jumping in my head.
For a second treat, google ELFavirenz and see the 260+ web sites that took the exact same text and put it up after
Ahh fixed the summary... (Score:5, Funny)
I *still* cringe to this day when someone asks for computer help and it starts out with "Well, when I log on to my AOL..."
TLF
Even better (Score:5, Interesting)
I quickly found that I could not log on to my account. I was wondering whether I misspelled my password or something, when I noticed (while reading the FAQ) in small print "Passwords must be 8 characters or less." Now, no warning of this was given anywhere on the sign up form.
In shock, I realized what the issue must have been. Sure enough, trying to log on with password "DaedAEca" worked like a charm.
Yes, not only did they not warn the user that there was a maximum on the password length while signing up, and not only did their form accept my 16-char password, but it actually would not let me log in with the full password. Man, I was pissed and confused for a while...
Re: (Score:2)
Re: (Score:2)
When signing up with Absolute Poker, I created a password with a comma in it. It accepted it and created the account.
Then I went to log in. After entering my password, I got an immediate error "password may not contain comma" (or other characters). I had to manually request support to a
Re: (Score:2, Funny)
> long password, and you're locked out.
But surely that's a good thing?
Radius? (Score:4, Interesting)
1. Log into AOL and only use the first 8 characters
2. Log into the AOL webmail and only use the first 8 characters.
This may indicate if the limitation is the sign in solution, or the entire userdb backend.
cluge
Re: (Score:2, Interesting)
(and yes that...sickeningly...means I actually used AOL for some time...)
I had a problem logging in to the AOL webmail because it *does not* truncate to the first 8 characters and I *thought* my password was longer than 8. Thus logging into the AOL app worked fine, but I had to manually truncate to 8 characters to get webmail working.
I thought it was a problem on my
Re: (Score:2, Informative)
1. Log into AOL and only use the first 8 characters
My AOL password happens to be exactly 8 characters long. When I tried salting it with asdf afterwards, the OS X AOL client (which I havn't opened in a year, mind you :-) will not accept characters after the 8th.
2. Log into the AOL webmail and only use the first 8 characters.
In this case, salting with asdfasdfasdf results in an error saying the password must be 16 characters or less, so salting it with asdfasdf (making the attempted password exactly 16 characters) I'm still allowed to log in, even though my true password doesn't contain the asdf's, and is only 8 c
Its actually worse than that (Score:5, Interesting)
They also don't hash passwords anymore in your registry from AIM6 onward. They encrypt them, but that's a lot easier to get around than hashing.
If you really want a more detailed explanation you can take a look at the 12/29/06 and 12/30/06 posts on this page - http://tsourceweb.com/ [tsourceweb.com] - but what I already mentioned is the crux of the issue. (We all know people on Slashdot dont like to read articles anyway
Re: (Score:2, Insightful)
Re: (Score:2)
AIM6 decrypts the password each time you log in and sends it plaintext over an SSL connection. I'd venture that storing a hash is more secure, because at least you have to crack that before you can change the user's password.
I can't think of any situation where a password stored plaintext or encrypted would
Re: (Score:2)
The original core was all done in PL/1 on Stratus fault-tolerant minicomputers. They continued to run the core up until a few years ago, but much of the design was so ingrained that it contin
Re: (Score:2)
Well, this is usually a trade-off between being able to have a secure authentication procedure (using challenge-response authentication) or not having to store the password in cleartext at the client. If you hash the password, you can't do a challenge-response authentication on that password (since it would need the cleartext password to be available at log-in tim
Worse than it sounds? (Score:3, Informative)
This is AOL we're talkikng about... (Score:4, Insightful)
Dog Days of AOL (Score:2)
Sure, plenty of folks have dogs with names longer than 8 characters.
At a certain university, (Score:2)
The flaw in question seemed to apply only to a web mail client which they are in the process of phasing out in favor of an open source solution, which is pretty interesting because it's the first I've seen which has support for S/MIME.
Presumably, the older system will be brought off line soon, as the flaw has been known for some time.
When signing on in front of people who didn't know about the flaw, it was fun to make them think you had a password in excess of
AIX (Score:5, Interesting)
Re: (Score:2)
You could always fix your pam stack instead of adding limitations to AD.
Re: (Score:2)
Good old IBM (Score:2)
Re: (Score:2)
Another reason not to use proprietary U
Found this last year. (Score:2, Informative)
Here's Why (Score:2)
Mitch Hedberg (Score:5, Funny)
"You know when a company wants to use letters in their phone number, but often they'll use too many letters? 'Call 1-800-I-Really-Enjoy-Brand-New-Carpeting.' Too many letters, man, must I dial them all? 'Hello? Hold on, man, I'm only on "Enjoy." How did you know I was calling? You're good, I can see why they hired you!'"
RIP Mitch
Same goes for cbb.dk :( (Score:2)
Flat Out Wrong - Read (Score:5, Informative)
br/>
A few test cases to pay attention to:
1) Sign up for an AOL mail account https://new.aol.com/freeaolweb/?promocode=814322&
Notice it only allows you to choose a password that's 6-8 characters, just like the AOL service itself. So now try and login with your password that's 6-8 characters, but add a few more. It lets you in right? Ok, so do this... reset/change your password now. Click "Forgot my Password" or whatever the link is called. Go through the questions and set a new password. Oh wait, notice it only lets you pick a 6-8 character password.
What does this mean? It means for AOL-service based/AOL-mail based accounts, they only allow 6-8 characters for the password! Who cares if it accepts extra characters. There is a 6-8 character limitation. It's absolutely irrelevant that it accepts additional characters.
They seem to be confusing this with AIM-only based accounts, which allow up to 16 character passwords and DO NOT allow anything more or anything less than the *EXACT* password. Try it yourself. If my AIM password is "pCv921!$z" it will reject me if I put "pCv921!$" and it will reject me if I put "pCv921!$z44". This is not that big of a deal and certainly isn't embarrassing. This is flat out a difference in AOL's mail-based system vs. AOL's AIM-based system.
Want to know a big shocker about AOL's mail-based system that they didn't figure out and report on that *is* embarassing?
These AOL.com (mail-based) and AOL-service based account are *NOT* case sensitive. That's right, try and make your password with some uppercase letters. It doesn't make a difference if your 6-8 character password has uppercase letters or not. It doesn't recognize it! I didn't check but I don't believe it recognizes special characters either. So your character set is a-z0-9.
Chew on that. Steven
Re: (Score:2)
Just be warned if you decide to abort partway through the process (I was desperate for free internet access, but not enough to give up my CC info) they will STILL KEEP THE INFORMATION YOU ENTER. I got a phone call several days later from a rep with a sales pitch.
Although this was 3 years ago I don't think they'll have changed it...
Re: (Score:2)
Re: (Score:2)
Embarrassing?! (Score:3, Insightful)
VNC too (Score:2)
Please, if the slashdot community is going to complain about how stupid password limits are, can someone fix the open source projects that have the same issue so that we can't point and laugh at that too?
Re: (Score:2)
Re: (Score:2)
This is also a good method for solving many other password-based issues. You can also use things like stunnel to encrypt any generic service via SSL/TLS/IPsec/etc.
Thank you /. (Score:2, Interesting)
Re: (Score:2)
VNC... (Score:2, Interesting)
Old adventure games (Score:3)
I think that Infocom, being the class act of text adventures, didn't suffer this "feature".
Re:No way. (Score:5, Informative)
Re:No way. (Score:5, Insightful)
Re:No way. (Score:4, Insightful)
Preferably, one would just write down a hint, of course. And not on a sticky-note on the monitor.
Re: (Score:2, Insightful)
Re: (Score:3, Insightful)
Re: (Score:2, Insightful)
Re: (Score:2)
Re: (Score:3, Funny)
Re: (Score:2)
The problem is postit-syndrome.
Re: (Score:3, Insightful)
Now those are people who do not understand the way people think. Mathematicians, not psychologists.
And they are the reason social engineering works so well.
People like having one, maybe two or three passwords.
So instead of making them change passwords regularly (and do note the analogy of having to change your front door lock every two months!), make them create one relatively secure password and drill them to memorize it, never, ever reveal it to anyone and never ever write it down.
Changing passwords d
Re: (Score:2)
The other problem is with revealing passwords. I know you said never to reveal it to anyone, but everyone must reveal their password at some point. I say this because anywhere that you input your password is reveali
Re: (Score:2)
For systems that I access regularly (at least 2 times per week) that need a secure password, I make up a long one and memorize it. I find that I can memorize and track about 6 of those. These passwords are either login passwords or ones that protect my GPG or SSH2 keys. Basically those 6-12 passwords are the keys to my kingdom and the only ones I memorize.
For systems that I don't hit regularly, and don't need access to them from random locations or on a minute's notice while aw
Re: (Score:3, Insightful)
I've seen ones where they specify things like 'must be 10 characters long, contain 2 symbols, 2 numeric characters, 2 uppercase'. They don't seem to realise that they are actually *reducing* the complexity of possible passwords.
If a cracker knows that a password *will* contain, eg, 2 non-alphanumeric characters plus 2 numerals plus 2 upper case characters and the required length
Re: (Score:2)
Of course, *then* I was shocked...
Re: (Score:2)
No. I just tried this on my work's development Solaris machine, as another poster suggested. Typed in the first 8 characters of my password then a whole lot of random junk
Re: (Score:2, Insightful)
Was that a question or a statement?
No linux distro that I have used in the past 8 years hashes only the leading 8 chars of a pass phrase. Even so a strong 8 char password is still a strong password (eg: *_Jilt3d) or even better with non-printable chars.
Re: (Score:2, Insightful)
Re: (Score:2, Funny)
Re: (Score:3, Funny)
Re: (Score:2)
If you want a secure 8-character password, use something like,
which yielded, b&9y@)HN just now. Humans are lousy password pickers, because we automatically patternize everything we see or create.
or better yet, tell strings to pick out 8-bit characte
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
I agree there, at least if it's not something predictable like a couple numbers at the end of a dictionary word.
Re: (Score:3, Informative)
Not since some time around 2000 when all of the major distributions switched from DES to MD5 authentication. Some major Unix vendors do still have the issue, though.
Re: (Score:2)
The rationale was compatibility with other UNIX-like systems, but it went away when MD5 hashing became popular and PAM was introduced. By 1998 most Linux distributions had already switched (but probably not Slackware). The rest all had it as an option. If you have a linux system today that you've upgraded repeatedly since back then (or kept the passwd/shadow files), you probably *still* have the limitation unless you forced your existing u
Re: (Score:2, Informative)
Re: (Score:2, Insightful)
Re: (Score:2)
The quote:
This means that a user who uses "password123" or any other obvious eight-character password
note that there is no reference to a section THAT COUNTS, the entire password "password123" was in QUOTES, as in "password123", and therefore, as it is the SECTION IN QUOTES that was emphasized by the author, indicates that the password in question is "password123" not "password". And it doesn't take a degree in math to note that "password123" is 11 characters long.
Think twice befo
Re: (Score:2)