You are viewing a single thread.
View all comments View context
13 points

How would they know how many digits changed? They don’t store the password in cleartext.

Right?

permalink
report
parent
reply
4 points

Well they don’t need to store it to a drive. You just entered your old password in order to login and authorise your password change.

It’ll still be in memory against your session.

permalink
report
parent
reply
2 points

Sure if the means of authorising a password change is your old pw then everythings fine

permalink
report
parent
reply
3 points

Used to have monthly changes for a Microsoft account. When trying to change, it said “You used this password 6 months ago, please use another”, besides the “passwords needs to be at least this different” message. Clearly they are storing them, not sure if they’re stored cleartext or they’re decrypting them on the fly somehow

permalink
report
parent
reply
5 points
*

You should not be able to decrypt a password, passwords aren’t encrypted but hashed, they would be insecure would they be encrypted.

Hashing differs from encryption in that it is irreversible, because two or more strings might result in the same hash if the hashing function is applied to them (hashing is not injective).

But since your password will always yield the same hash you can compare the two hashes and if they are equal you are considered authenticated. If you try to log in with a different password (or even the hash of the correct password) then it will produce a different hash resulting in a failed authentication attempt

The way crackers get a password if they have the hash is by guessing pw candidates and using the hash function on them, if its the same as the hash they have they found the/a valid password. The guessing can be quite involved and with enough time and data about a victim often 12-13 digit passwords with special characters and all can be cracked - If the victim used a somewhat mnemonic pw that is. Generated pws from a password safe are much safer (but usually also longer).

In your case I suspect MS was storing a history of hashes which is not advisable as it gives potential crackers more to work with, but its way less bad then storing plain text or encrypting passwords

permalink
report
parent
reply
0 points

No you don’t need to store anything in clear text to check password parameters

permalink
report
parent
reply
6 points

But you need to know previous password if the objective is to make sure there’s at least two characters difference compared to new password

permalink
report
parent
reply
0 points
-1 points

You could take the old password, change one or two letters and compare the hash to the hash of the new password?

permalink
report
parent
reply
7 points

That’s the point though.

You’re not supposed to have the old password. If you had the old password you could just compare it to the new password.

The only way you can do it is to take the new password and make a hash for every possible single-character variation and compare them all to the old hash

permalink
report
parent
reply
1 point

They shouldn’t be storing the old password hashed, either. Expired password hashes should be destroyed like any other potentially-sensitive information that is no longer business critical.

There is a reason hackers look to get users tables even though the passwords are hashed. Because with enough of them and enough time, they can usually figure out plaintext. Giving them 10 previous hashed passwords for each user is just increasing the hypothetical risk.

permalink
report
parent
reply
1 point

Sorry, that’s what I meant as well :) Came out upside down when I wrote. We used to figure out shitty ISP router passwords this way by having a table of common passwords and their hashes.

permalink
report
parent
reply

Memes

!memes@lemmy.ml

Create post

Rules:

  1. Be civil and nice.
  2. Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.

Community stats

  • 8.9K

    Monthly active users

  • 12K

    Posts

  • 264K

    Comments