ColinTheMathmo,
@ColinTheMathmo@mathstodon.xyz avatar

I've just registered with a professional organisation and received, in clear, my user details, including the password they generated for me. Along with the text:

"To maintain this security, you cannot change your password and we have no means of retrieving lost passwords."

!!!

This is horrendous ... incredibly bad practice.

From a professional organisation.

Mind-boggling.

ColinTheMathmo,
@ColinTheMathmo@mathstodon.xyz avatar

Calling @Chartodon ...

quikkie,

@ColinTheMathmo 23years in the industry, the only time I've seen something like that was around a decade ago at a British supermarket delivery service although you could change your password.
Slightly more recently (8 years?) a British ISP could send plain text password reminders.

In Oz (because I signed up recently) the supermarket websites have a password reset workflow for the users to choose their own password. I point out a supermarket as they aren't an infosec company.

Telling you what your (temporary) password is isn't terrible as long as you can change it. Not being able to change it is frankly awful security.

glc,
@glc@mastodon.online avatar
iwastux,

@ColinTheMathmo That is terrible!! I'm not a cyber security professional but Article 32 of GDPR states that when processing personal data, appropriate technical and organizational measures shall be implemented to ensure a level of security appropriate to the risk, including the use of encryption where appropriate. It also states that the encryption solution used should meet current standards. Refer to this for more details: https://eur-lex.europa.eu/eli/reg/2016/679

daveirving,
@daveirving@aus.social avatar

@ColinTheMathmo
That's horrifying.

I'm not a security expert, but even I know what poor practice that is.

badgermind,

@ColinTheMathmo happened to me as well. I was going to raise it with them but it slipped my mind.

jesusmargar,
@jesusmargar@mastodon.social avatar

@ColinTheMathmo tattoo it on one of your kids

ColinTheMathmo,
@ColinTheMathmo@mathstodon.xyz avatar

Please, if you're a computer security professional, reply in this thread so I can subsequently point them to it. I need to have people with real experience detailing just how bad this is ... there's no way they'd listen to me.

And if you're comfortable doing so, please boost for reach.

Thank you.

fifonetworks,

@ColinTheMathmo
My credentials:

  1. I do cybersecurity consulting for electrical power generating plants.
  2. I’ve developed and taught cybersecurity courses at two colleges.
  3. Companies pay me to help design their cybersecurity policies, disaster recovery plans, and incident response plans.

My opinion that you asked for:
Sending passwords in an unencrypted email is only ever acceptable if the user is required to change the password at first login.

ColinTheMathmo,
@ColinTheMathmo@mathstodon.xyz avatar

@fifonetworks Perfect ... thank you, much appreciated.

luna,

@ColinTheMathmo hey @gsuberland here’s one for you

gsuberland,
@gsuberland@chaos.social avatar

@luna @ColinTheMathmo yeah no this is awful practice, it breaks pretty much every rule.

  • should never send passwords via email, ever

  • should never store passwords in plain text - hash passwords with something like bcrypt or argon2

  • a password change workflow is super important in case of account compromise

experience in this matter: 10 years as a security professional (penetration testing + security research)

ColinTheMathmo,
@ColinTheMathmo@mathstodon.xyz avatar

@gsuberland To be fair, it's not clear that they are storing the pwd in clear ... the fact that they claim they can't recover it suggests otherwise.

For everything else ... yes.

CC: @luna

gsuberland,
@gsuberland@chaos.social avatar

@ColinTheMathmo @luna yeah, that is fair, but worth specifying the correct process just in case it's flat MD5 or something.

gsuberland,
@gsuberland@chaos.social avatar

@ColinTheMathmo @luna also, just in case my professional credentials are meaningless to them, there's also this:

https://security.stackexchange.com/users/5400/polynomial

ColinTheMathmo,
@ColinTheMathmo@mathstodon.xyz avatar

@gsuberland Super ... thank you.

CC: @luna

ColinTheMathmo,
@ColinTheMathmo@mathstodon.xyz avatar

@gsuberland Agreed, although my experience with organisations like this is that if you say "Passwords should be stored encrypted with XXX or YYY" then they'll focus on that, say that they do it, and ignore all the other horrendous breaches.

But we're on the same page here ... thank you.

CC: @luna

rotopenguin,
@rotopenguin@mastodon.social avatar

@gsuberland instead of a password change workflow, we have an employee change workflow. In order to change your password, we have to wipe out your vacation time and set you back to starting pay.

stufromoz,
@stufromoz@aus.social avatar

@ColinTheMathmo @futzle as someone who works in a software company that deals with insurance companies and is very conscious of security risks, that is completely unacceptable. We have a policy of never sending passwords in email, and require users to set up their own password at the first time they try to login. Our reset password option sends a link to the email of the registered user that requires their username to be entered to change their password…

crablab,

@ColinTheMathmo You could point them towards the general NCSC guidance on password policies: https://www.ncsc.gov.uk/collection/passwords/updating-your-approach

Having immutable passwords is an instant failure on stuff like CyberEssentials.

grwster,
@grwster@mastodon.social avatar

@ColinTheMathmo Ugh, computer security / identity management professional (emeritus) here, and this is pretty much the opposite of best practice. They get marks for verifying your email address, a step many sites fail to do, but any autogenerated password sent in the clear during account creation or password recovery should be changed on first use and should expire if not used in a timely fashion.

dimpase,
@dimpase@mathstodon.xyz avatar

@ColinTheMathmo I am a lecturer in the CS Department in Oxford, with a lot of experience in various projects involving security, passwords, etc. The described practice is very, very bad.

Chances are that many many login credentials issued this way are already available on the internet, for sale, or just for "fun".

Unixbigot,
@Unixbigot@aus.social avatar

@ColinTheMathmo @futzle the number one way that organizations fall to cyberattack is having one low level employee compromised, and then strip mining that persons inbox for every password they have ever sent or received by email and using these for further attacks. Never. Email. Passwords.

dplattsf,
C4th0de,

@ColinTheMathmo Why wouldn't they listen to you?

ColinTheMathmo,
@ColinTheMathmo@mathstodon.xyz avatar

@C4th0de They're a professional organisation, and I have neither formal qualifications nor track-record in security. They will be accustomed to cranks, so a letter telling them they've got their security wrong will be ignored.

Unless it comes from someone they know, with a track-record, and qualifications, and quoting lots of stuff.

They need to be hit with a hammer. In their world, I'm a nothing.

I will be trying to find an individual in the org who knows me ... we'll see what happens.

sadur,

@ColinTheMathmo I manage passwords in my school. Even the students' passwords for the computer room's account can be changed by users at any moment. And, of course, users are forced to change the password the first time they login.

Bonne,

@ColinTheMathmo Remove the account and go somewhere else. This is totally incomprehensible

ColinTheMathmo,
@ColinTheMathmo@mathstodon.xyz avatar

@Bonne I agree that it's incomprehensible and unacceptable. Sadly, I need to register an account with them to go to an event they're running.

I'm certainly not going to trust them with any details of value.

pseudonym,
@pseudonym@mastodon.online avatar

@ColinTheMathmo You are correct.

This is bad, lazy, insecure, and a sign that the organization probably has other things wrong with it. I wouldn't interact with them further.

I've got a CISSP, and have been working in #infosec for about 10 years. That doesn't give me any special authority on the topic, but you asked.

ISO 800-53 requires that users should be allowed to select and change their own passwords.

Will you name the org doing this?

ColinTheMathmo,
@ColinTheMathmo@mathstodon.xyz avatar

@pseudonym Thanks for the reference ... I've found the relevant section to be able to quote it to them.

I'm always reluctant to name organisations without first giving them a chance to respond to having these issues raised.

pseudonym,
@pseudonym@mastodon.online avatar

@ColinTheMathmo

Absolutely the right course of action.

ColinTheMathmo,
@ColinTheMathmo@mathstodon.xyz avatar

@pseudonym 👍

thefyuuri,

@ColinTheMathmo can't give more than saying I hold a Cybersecurity undergrad degree with a SEC+ that was formerly an ISSO (Information Systems Security Officer) that now works as a sysadmin, but it's definitely Security 101 to not send clear text passwords. Especially immutable ones!

ColinTheMathmo,
@ColinTheMathmo@mathstodon.xyz avatar

@thefyuuri Thank you!

living8bit,

deleted_by_author

  • Loading...
  • ColinTheMathmo,
    @ColinTheMathmo@mathstodon.xyz avatar

    @living8bit Super ... thanks.

    penguin42,
    @penguin42@mastodon.org.uk avatar

    @ColinTheMathmo Of course they can retrieve the password - they can look in their mail log.....

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • DreamBathrooms
  • ngwrru68w68
  • tester
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • mdbf
  • tacticalgear
  • JUstTest
  • osvaldo12
  • normalnudes
  • cubers
  • cisconetworking
  • everett
  • GTA5RPClips
  • ethstaker
  • Leos
  • provamag3
  • anitta
  • modclub
  • megavids
  • lostlight
  • All magazines