Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Feds tell Web firms to turn over user account passwords
Cnet ^ | 25 July, 2013 | Declan McCullagh

Posted on 07/25/2013 3:49:38 PM PDT by Errant

The U.S. government has demanded that major Internet companies divulge users' stored passwords, according to two industry sources familiar with these orders, which represent an escalation in surveillance techniques that has not previously been disclosed.

If the government is able to determine a person's password, which is typically stored in encrypted form, the credential could be used to log in to an account to peruse confidential correspondence or even impersonate the user. Obtaining it also would aid in deciphering encrypted devices in situations where passwords are reused.

"I've certainly seen them ask for passwords," said one Internet industry source who spoke on condition of anonymity. "We push back."

(Excerpt) Read more at news.cnet.com ...


TOPICS: Constitution/Conservatism; Crime/Corruption; Extended News; Government
KEYWORDS: benghazi; computers; cyber; fastandfurious; impeachnow; irs; loadurgunsboys; nsa; passwords; security
Navigation: use the links below to view more comments.
first previous 1-20 ... 101-120121-140141-160 ... 181-184 next last
To: The Antiyuppie

Great...


121 posted on 07/25/2013 7:14:01 PM PDT by DoughtyOne (Kill the bill... Begin enforcing our current laws, signed by President Ronald Reagan.)
[ Post Reply | Private Reply | To 81 | View Replies]

To: autumnraine
Yes. If you will recall Vizzini tried to out-think Inigo Montoya and guess which cup had the poison.

They both did.

Sort of a Renaissance version of Canada Bill Smith's Law, i.e. the game you're playing and are prepared for isn't the game your opponent is playing!

122 posted on 07/25/2013 7:14:47 PM PDT by null and void (You don't know what "cutting edge" means till you insult Mohammed.)
[ Post Reply | Private Reply | To 115 | View Replies]

To: stockpirate; Errant

.

“Do not blame Caesar, blame the people of Rome who have so enthusiastically acclaimed and adored him and rejoiced in their loss of freedom and danced in his path and gave him triumphal processions. Blame the people who hail him when he speaks in the Forum of the ‘new, wonderful, good society’ which shall now be Rome’s”

-Marcus Tullius

.


123 posted on 07/25/2013 7:15:54 PM PDT by LucyT ("Once you've gone round the bend you've gone as far as you can go. ")
[ Post Reply | Private Reply | To 98 | View Replies]

To: Errant

I think I might know.


124 posted on 07/25/2013 7:16:41 PM PDT by null and void (You don't know what "cutting edge" means till you insult Mohammed.)
[ Post Reply | Private Reply | To 119 | View Replies]

To: Myrddin

Which makes me wonder again. Why ask for the hash files if they can just get the passwords the old fashioned way?


125 posted on 07/25/2013 7:17:45 PM PDT by Black Agnes
[ Post Reply | Private Reply | To 117 | View Replies]

To: null and void

I know, the INCONCEIVABLE part was the favorite of part of his character.

I knew Andre the Giant from back in his wrestling days in Atlanta in the 80’s. He really was a gentle giant.


126 posted on 07/25/2013 7:19:09 PM PDT by autumnraine (America how long will you be so deaf and dumb to thoe tumbril wheels carrying you to the guillotine?)
[ Post Reply | Private Reply | To 122 | View Replies]

To: Mad Dawgg

Ask your representative about it when they go home next month and hold a community meeting in your area. Mine voted to defund it.


127 posted on 07/25/2013 7:26:22 PM PDT by Errant
[ Post Reply | Private Reply | To 103 | View Replies]

To: Errant
Sadly I believe we are well past taking our case to representatives.

When I say the founding fathers would be shooting by now I am not joking. I fear before its all done there will be a massive bloodletting before we right this ship.

128 posted on 07/25/2013 7:29:09 PM PDT by Mad Dawgg (If you're going to deny my 1st Amendment rights then I must proceed to the 2nd one...)
[ Post Reply | Private Reply | To 127 | View Replies]

To: null and void
The “an essay” has 7 such facilities, the one in Utah everyone talks about, and six more scattered across the land.

The number I've heard bandied about is yottabyte. A yottabyte is 1e24 bytes. The output of the SHA1 function is 20 bytes long.

If you allow all the printable ASCII (95 characters) in passwords, the number of 13-character passwords is 95**13, or 51334208327950511474609375. To store that many 20-byte hashes, you'd need over a thousand yottabytes. But, barring a major break-through in storage technology, I think it's be quite a while before Bluffedale holds even one full yottabyte.

Recently Brewster Kahle (the guy behind the Wayback Machine) estimated the cost of storing a year's worth of US phone audio at about $29m. The amount of storage needed? 272 petabytes. There are a billion petabytes in a yottabyte.

129 posted on 07/25/2013 7:31:57 PM PDT by cynwoody
[ Post Reply | Private Reply | To 116 | View Replies]

To: Errant
No Comment... I'd be banned for life if I said what I'm thinking about our so-called "representatives" in "FREAKING" Washington DC who are letting this CRAP happen...
If the government is able to determine a person's password, which is typically stored in encrypted form, the credential could be used to log in to an account to peruse confidential correspondence or even impersonate the user.

No no no!
This is the dummest thing the new American Reign of Terror Flying Monkeys can adopt.

After the criminal shenanigans of the State Dept, the CIA, IRS, Health and Human service and the State Department have pulled, any evidence that those flying Monkeys try to present in court, as a result of this abuse, won't be worth a bucketful of spit!

Bring
it
on!!

"Your Honor, this criminal internet post by the accused was NOT falsified by us; Trust us, your Honor!"

*snicker*

130 posted on 07/25/2013 7:33:03 PM PDT by publius911 (Look for the Union label, then buy something else.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Black Agnes
If you get the hash files, then you can use the rainbow tables to map a plain text ASCII password that will produce the hash. At that point, you have access to the account with the password through the front door. You get all the privileges accorded via the authentication and authorization applied to that user. Cookies and sessions work via the web interfaces. If you're really brazen, you can also change the password as most systems require presentation of the old password in the process of creating a new one.
131 posted on 07/25/2013 7:42:16 PM PDT by Myrddin
[ Post Reply | Private Reply | To 125 | View Replies]

To: Errant
You are making this way too complex. With a few lines of code, you can store the password entered online (before it's even hashed) into a accessible table and wrap things up by grabbing any information fields the agency wished to collect.

The point is, they don't need the user's password if they can lean on the service provider. And, if they do have the password, actually using it would be problematic because of the danger they'll alert the target accidentally.

You can bypass this easily when you grab the data directly from the DB with another application.

Of course. Which they can do, with the web provider's cooperation.

And you can even alter the DB logs if you have the proper levels and the right tools.

No need. The only reason to hack the logs would be if they had gained surreptitious access to the provider. But they don't need to do that, because they're the government.

132 posted on 07/25/2013 7:47:20 PM PDT by cynwoody
[ Post Reply | Private Reply | To 104 | View Replies]

To: BenLurkin
It just occurred to me how useful it would be to them to simply change the passwords of people who they wanted to lock out of the internet. Do enough at the same time and a lot of dissent would come to a grinding halt.

Yup. That's one way to do a denial of service attack against specific individuals.

In many corporations, such DOS attacks against users is absolutely trivial to implement, as all it takes is 3 or 4 bad login attempts to lockout a user. Some even implement this in their webmail accounts that are tied to their user accounts. How hard is it for someone to go to a starbucks and lockout a whole series of executives just by killing (temporarily anyway) their current password, as the userIDs are so easy to guess.

 

133 posted on 07/25/2013 7:55:25 PM PDT by zeugma (Be a truechimer, not a falseticker!)
[ Post Reply | Private Reply | To 44 | View Replies]

To: cynwoody; null and void
if they can lean on the service provider.

That's what the article implied, that they were leaning on the providers. They big question as null and void mentioned, is what's the real reason they want peoples Pwds?

No need. The only reason to hack the logs would be if they had gained surreptitious access to the provider. But they don't need to do that, because they're the government.

The might need to do it if their intent was setting someone up.

134 posted on 07/25/2013 7:57:31 PM PDT by Errant
[ Post Reply | Private Reply | To 132 | View Replies]

To: publius911
After the criminal shenanigans of the State Dept, the CIA, IRS, Health and Human service and the State Department have pulled, any evidence that those flying Monkeys try to present in court, as a result of this abuse, won't be worth a bucketful of spit!

Very true.

I would think careful federals would actually prefer not to learn the target's password, lest they be seen to have contaminated the chain of custody.

If the prosecution produces damning evidence gleaned from a provider's servers, a possible defense is to claim the defendant didn't put it there, that someone else logged into the account and added the incriminating stuff. The last thing they need is for the defense to claim that someone was a G-man!

135 posted on 07/25/2013 7:58:04 PM PDT by cynwoody
[ Post Reply | Private Reply | To 130 | View Replies]

To: taxcontrol
To verify a password, the submitted password is put through the same hash and the output is compared to the stored hash. If they match then the proper password has been submitted.

For those of us who are somewhat knowledgeable, but not hackers, can you give us a real world made-up example so it can more easily be grasped?

136 posted on 07/25/2013 8:00:20 PM PDT by publius911 (Look for the Union label, then buy something else.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: cynwoody
If I understand what you are saying, in order to get every possible input that would result in any 20 byte hash, you would need 1e27 bytes.

The question is how many inputs would you need to store to generate all possible 20 byte hashes?

That is a far smaller number.

If I have a unique 20 byte hash, to get into the account I only need ONE of the 2x106 or so possible combinations that generates that particular 20 byte hash, I don't need ALL of them.

137 posted on 07/25/2013 8:01:54 PM PDT by null and void (You don't know what "cutting edge" means till you insult Mohammed.)
[ Post Reply | Private Reply | To 129 | View Replies]

To: publius911

Suppose the hash was equal to the sum of the bytes in a given password.

If my password was 1111111111 my hash would be 10.

Anyone who puts in 1111111111 would get 10.

So would anyone who put in 22222, or 55, or 19 or 244, or 82, or 28 or...


138 posted on 07/25/2013 8:05:26 PM PDT by null and void (You don't know what "cutting edge" means till you insult Mohammed.)
[ Post Reply | Private Reply | To 136 | View Replies]

To: null and void

"That's the stupidest password I've ever heard! That's the kind of thing an idiot puts on his luggage!”

139 posted on 07/25/2013 8:07:33 PM PDT by dfwgator
[ Post Reply | Private Reply | To 138 | View Replies]

To: dfwgator

I tried to keep it simple...


140 posted on 07/25/2013 8:08:17 PM PDT by null and void (You don't know what "cutting edge" means till you insult Mohammed.)
[ Post Reply | Private Reply | To 139 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 101-120121-140141-160 ... 181-184 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson