Welcome to the Second Life Forums Archive

These forums are CLOSED. Please visit the new forums HERE

URGENT! LL security exploit

Dale Glass
Evil Scripter
Join date: 12 Feb 2006
Posts: 252
09-08-2006 16:40
From: Tuach Noh
I reiterate: you are simply not paying attention. I don't know who you think you're arguing with, because you're obviously not reading what I wrote.


Your argument seems to be that LL did wrong by resetting the passwords because the hash would have protected them. But that's wrong. It doesn't matter how they do it, and what arcane techniques they use for authentication: In the end, the attackers had everything required to start getting passwords within an hour or two. Not resetting the passwords would have meant them giving much more time to do a lot of damage.

Perhaps they did some already and it didn't go public yet. I wonder why it took two days, maybe because LL first didn't know the database was compromised, and has just noticed something strange?
Dale Glass
Evil Scripter
Join date: 12 Feb 2006
Posts: 252
09-08-2006 16:45
From: Tuach Noh
Adam and I seem to tentatively agree that that's the most likely explanation, although I still have some suspicion in the "screw this, let's at least look like we're doing something decisive" direction.


It makes perfect sense, when you realize your system has been breached the first thing to do is to take it offline and examine it. And reset all passwords, of course. This will, no doubt, annoy lots of people, but it doesn't mean it's not the right action to take.

From: Tuach Noh

But if that were the case, you would pull the plug immediately (which I guess explains the downtime Wednesday), not wait two days


Now this is a much better subject for discussion. My wild guess is that they took the web servers offline because they found about a new vulnerability, or the servers were directly breached. They still didn't know they got the database until now.

From: Tuach Noh

and still have no plan for dealing with the obvious fallout from such a reset.


What plan can there be? There was just one thing to do, reset the passwords. Then do the obvious thing, handle the tech support issues (which is fair to say they're not doing very well)
Fenrir Reitveld
Crazy? Don't mind if I do
Join date: 20 Apr 2005
Posts: 459
09-08-2006 16:47
From: Tuach Noh
Adam and I seem to tentatively agree that that's the most likely explanation, although I still have some suspicion in the "screw this, let's at least look like we're doing something decisive" direction.

I apologize if I am restating the obvious then, I'm a bit distracted. But yes, this is all falling into place -- the sudden downtime, the immediate password reset.

Whee! That's all I know what to say.
_____________________
----
----
----
cinda Hoodoo
my 2cents worth
Join date: 30 Dec 2004
Posts: 951
09-08-2006 16:47
From: Jeska Linden
Just to remind everyone, the passwords were encrypted, this is a security precaution to prevent any further security/account issues.

:mad:
oh Jeska that makes me feel SOOOOOOOO much better, i cant even get in to my $200 a MONTH Acct!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

I am so freking mad i could chew nails...how dare you do this...after 2 days my god..and i know my PETS name dammit, i sure the hell dont know why YOU dont.....
Joshua Nightshade
Registered dragon
Join date: 12 Oct 2004
Posts: 1,337
09-08-2006 16:47
From: Fenrir Reitveld
I apologize if I am restating the obvious then, I'm a bit distracted. But yes, this is all falling into place -- the sudden downtime, the immediate password reset.

Whee! That's all I know what to say.


you guys hijacked my thread to waste technospeak on it.

I hate you all.
_____________________


Visit in-world:
http://tinyurl.com/2zy63d

http://shop.onrez.com/Joshua_Nightshade
http://joshuameadows.com/
Tuach Noh
Ignorant Knowlessman
Join date: 2 Aug 2006
Posts: 79
09-08-2006 16:55
From: Dale Glass
However strong it is, it doesn't matter. With any hash you can still get the low hanging fruit in minutes, and there's going to be lots and lots of it among half a million accounts.


Okay, prove it.

CODE
string strPassword = XXXX;
integer iRounds = XXXX;
integer iNonce = 12345;
string strHash;

default {
state_entry() {
integer i;
strHash = strPassword;
llOwnerSay("Start!");
for (i=0; i<iRounds; i++)
strHash = llMD5String(strHash,iNonce);
llOwnerSay("Done.");
}

touch_start(integer total_number) {
llSay(0, strHash);
}
}


The output when clicked:

From: Object
Object: beacface99bd0dc785fc0347348d6c29


I'll give you L$10,000 if you recover the password in 48 hours or less. (Repost this script in the scripting forum showing the correct values for the two omitted variables, if this one goes away by then.)

The password is one lowercase English word. Lowercase a-z only, no numbers or special symbols. I even checked; it's in my dictionary.

Trivial, right? I mean, it's MD5. I gave you the source code. I even gave you the nonce value.

Come on... "any hash." Put up or shut up.
Dale Glass
Evil Scripter
Join date: 12 Feb 2006
Posts: 252
09-08-2006 17:05
From: Tuach Noh

I'll give you L$10,000 if you recover the password in 48 hours or less. (Repost this script in the scripting forum showing the correct values for the two omitted variables, if this one goes away by then.)


Again, you're not getting it. They got the database, which is a table with half a million hashes. It also has the salt, because it has to have it. They got into the webserver, which somewhere in it had the function that validates your password. Which means they also have the hashing count. Resuming, the attacker has:
  1. Half a million hashes
  2. Their associated salts
  3. Account information
  4. Whatever function is used to validate the password


So, for the attacker: iRounds is known, iNonce is known, strHash is known, plus account data is known to guess what the password might be. Somebody in that database, probably multiple people will have the password of "password". Determining who is only going to take minutes.
cinda Hoodoo
my 2cents worth
Join date: 30 Dec 2004
Posts: 951
maybe try this...
09-08-2006 17:13
i think there was more than one security question, other than pets, i tried my fav hobby and it worked, try your moms maiden name etc...try anything but beat LL at is own game dammit, this is atrocious!!! and i bet it lands LL in the mud hole over this one, i got in and im still furious!

Now my partner cant get in great just great, what about all the ppl that owe us rent today that cant get in?????? This is costing us MONEY...and its just not rite, we did not create this problem, yet we are paying for it...yes LL i am NOT a happy, and satisfied customer about now...if that matters any at all to you...
Buster Venkman
Registered User
Join date: 21 Feb 2006
Posts: 47
09-08-2006 17:17
Also, who cares about the stupid password.

Sounds like they have unencrypted Name, Address, Phone, and let's say 10% of the users used their mother's maiden name as the security question.

What they're really after are the roughly 5000 credit cards that they can now call up and transfer funds /open new accounts using the owners name, address, phone, and maiden name info.

So the encryption to worry about is NOT the password, but sixteen digit numbers. Brute force.
Tuach Noh
Ignorant Knowlessman
Join date: 2 Aug 2006
Posts: 79
09-08-2006 17:18
You said:

From: someone
However strong it is, it doesn't matter. With any hash you can still get the low hanging fruit in minutes,


But I wrote a hash function in under five minutes using only tech that LL is known to have that demonstrates that you are completely full of it. Nothing for you to do now but backpeddle and start qualifying your ignorant claim.

From: someone
They got into the webserver, which somewhere in it had the function that validates your password.


I'd like to know how they got that from a SQL injection.

From: Dale Glass
iRounds is known,


In the LL case, the iRounds is NOT known (if they even use a similar mechanism, about which you have no idea). You don't know if MD5 is used. You have no idea whether or how they apply the salt.

Actually, it seems sufficient to stop that sentence here:

You have no idea.

My L$10,000 is completely safe, from both hackers and you.
McWheelie Baldwin
Registered User
Join date: 9 Apr 2004
Posts: 154
Block trouble before it hits????
09-08-2006 17:20
From: Burke Prefect
Hooah to LL for getting on this and taking needed actions (if slight overkill) to block trouble before it hits.


Are you serious? It took them two days to do anything about the database being comprimised. The hack took place on wednesday when all the website problems were happening. You think allowing account info to be in the wild for 2 full days before lifting a finger to take any action is getting on it before trouble hits, think again. Not to mention the vague information they're provided us with regards to what information was comprimised, and the lack of phone support till after the weekend doesn't seem like LL getting right on things to me. I guess I just have higher standards for personal information security.
_____________________


Dale Glass
Evil Scripter
Join date: 12 Feb 2006
Posts: 252
09-08-2006 17:28
From: Tuach Noh

My L$10,000 is completely safe, from both hackers and you.


Since you wrote the challenge post, I already coded a little program that tried 676000 passwords against your string using up to 100 MD5 iterations. Unless your iteration count is brutally high, I think I have quite good chances.
Tuach Noh
Ignorant Knowlessman
Join date: 2 Aug 2006
Posts: 79
09-08-2006 17:30
From: Dale Glass
Since you wrote the challenge post, I already coded a little program that tried 676000 passwords against your string using up to 100 MD5 iterations. Unless your iteration count is brutally high, I think I have quite good chances.


Best of luck. Please don't post anymore til you get it.

Edit: I will post the script (here or on the scripting forum) on Monday with nothing removed to prove that I'm on the level.
Dale Glass
Evil Scripter
Join date: 12 Feb 2006
Posts: 252
09-08-2006 17:40
From: Tuach Noh
Best of luck. Please don't post anymore til you get it.


Eh, no.

Whatever happens to our little contest isn't very relevant. First, if they have the database, they will be able to guess the base algorithm quite easily. The two most common ones are MD5 and SHA1. MD5 and SHA1 generate outputs of different length, making it quite easy to guess which is it.

Next, you need the salt or nonce, which is going to be in the table.

Assuming they're using an algorithm like your, it's still quite trivial: They only need to try to decrypt their own password! Once they crack it, they'll know for sure the decryption method works, and will go on to work on the rest of the database.

I suppose you're not completely stupid though, and used some number in the millions, because that's really the only difficulty of the contest.
Tuach Noh
Ignorant Knowlessman
Join date: 2 Aug 2006
Posts: 79
09-08-2006 17:54
From: Dale Glass
MD5 and SHA1 generate outputs of different length, making it quite easy to guess which is it.


Unless I use MD5 on the penultimate SHA1 key to make it look like an MD5 key, making you spend the rest of your natural life using the wrong hash because it was so obvious which one I used...

From: someone
Assuming they're using an algorithm like your, it's still quite trivial:


They would be stupid to use an algorithm I coded in a weak scripting language in a few minutes.

Make the salt the key to a nonrepeating generator function and use the output of the generator function at each round.

Then use SHA1 on even numbered rounds and MD5 on odd numbered rounds.

Then swap the first character with the character in the (current round#) position.

Add a few more inefficient text operations to each round. They don't need to be well documented, as long as they're reproducible.

Keep going until it takes a fast CPU about 10ms to compute the hash. Add rounds once a year to keep the calculation time constant as CPU speeds increase.

From: someone
They only need to try to decrypt their own password! Once they crack it, they'll know for sure the decryption method works, and will go on to work on the rest of the database.


They still need to know what algorithm they're using. They don't.

From: someone
I suppose you're not completely stupid though, and used some number in the millions, because that's really the only difficulty of the contest.


You will see the truth on Monday.
Joshua Nightshade
Registered dragon
Join date: 12 Oct 2004
Posts: 1,337
09-08-2006 17:55
From: Joshua Nightshade
you guys hijacked my thread to waste technospeak on it.

I hate you all.


you guys hijacked my thread to waste technospeak on it.

I hate you all.
_____________________


Visit in-world:
http://tinyurl.com/2zy63d

http://shop.onrez.com/Joshua_Nightshade
http://joshuameadows.com/
ArchTx Edo
Mystic/Artist/Architect
Join date: 13 Feb 2005
Posts: 1,993
09-08-2006 17:57
From: Aces Spade
I can't remember my security answer and i cant call LL this sucks

I had the same problem, finally after trying numerous misspellings I guess it. Hard to believe I misspelled it the first time??!!?? I am sceptical to say the least.

Try misspellings of the answer. Maybe you will get it right.

But yes this sucks, its as if LL tries to make things as miserable as they can for thier customers.
_____________________

VRchitecture Model Homes at http://slurl.com/secondlife/Shona/60/220/30
http://www.slexchange.com/modules.php?name=Marketplace&MerchantID=2240
http://shop.onrez.com/Archtx_Edo
ArchTx Edo
Mystic/Artist/Architect
Join date: 13 Feb 2005
Posts: 1,993
09-08-2006 18:00
From: Travis Lambert
This is a really, really bad day to be working in Support at Linden Labs. :eek:


Actually quite the opposite, they all got off early, they are not answering the phone, I tried and got a recording, no telephone assistance until Monday.
_____________________

VRchitecture Model Homes at http://slurl.com/secondlife/Shona/60/220/30
http://www.slexchange.com/modules.php?name=Marketplace&MerchantID=2240
http://shop.onrez.com/Archtx_Edo
Tuach Noh
Ignorant Knowlessman
Join date: 2 Aug 2006
Posts: 79
09-08-2006 18:00
From: Tuach Noh
Keep going until it takes a fast CPU about 10ms to compute the hash. Add rounds once a year to keep the calculation time constant as CPU speeds increase.


Which reminds me, it's been about a year since I updated the password algorithm on the site I run. Excuse me, I'm needed elsewhere. Not to worry, I'll be back Monday.

Have a great weekend, and don't let your CPU overheat!
Gelob Magpie
Registered User
Join date: 16 Apr 2005
Posts: 18
09-08-2006 18:03
oh yeah so all they care about is us changing our passwords. Oh well to info that was taken
Dale Glass
Evil Scripter
Join date: 12 Feb 2006
Posts: 252
09-08-2006 18:49
From: Tuach Noh

You will see the truth on Monday.


No need to wait so long.

CODE

string strPassword = "concentricity";
integer iRounds = 3981;
integer iNonce = 12345;
string strHash;

default {
state_entry() {
integer i;
strHash = strPassword;
llOwnerSay("Start!");
for (i=0; i<iRounds; i++)
strHash = llMD5String(strHash,iNonce);
llOwnerSay("Done.");
}

touch_start(integer total_number) {
llSay(0, strHash);
}
}


[18:47] Object: beacface99bd0dc785fc0347348d6c29

Cracked on a dual Athlon MP 2000+, using both CPUs at once, in 20 minutes, using a 234937 words list, trying up to 10000 iterations. Process worked at about 30 passwords/second with my sluggish perl script.

Now where are my L$10000?
Huns Valen
Don't PM me here.
Join date: 3 May 2003
Posts: 2,749
09-08-2006 18:50
If you don't remember your security question/don't have a valid email, they will probably ask you to mail or fax a copy of your driver's license. How else could they authenticate you? Asking the security question is already dumb because the attackers presumably have it.

Perhaps they could let people reset their password without email if they were coming from the same IP (or range maybe?) that they have used with SL in the last month.
Joel Glass
Registered User
Join date: 22 Feb 2006
Posts: 14
09-08-2006 18:58
From: Skye McArdle
Oh great. I get the email back and it sends me to a page that says..

" Security Question
Please contact Linden Lab customer support, we do not have a security question on file for your account."

so now I'm waiting for email, when I was happily in the middle of a build before I logged :/.



Yeah - one of my alts got that one too, all the others made it back on just fine...
Dale Glass
Evil Scripter
Join date: 12 Feb 2006
Posts: 252
09-08-2006 19:29
From: Tuach Noh
Which reminds me, it's been about a year since I updated the password algorithm on the site I run. Excuse me, I'm needed elsewhere. Not to worry, I'll be back Monday.


Well, let's see if you're indeed back this Monday. Wouldn't be very surprised if you weren't. Your departure's timing is quite suspicious.
Teale Severine
Registered User
Join date: 13 Sep 2005
Posts: 24
Password change
09-08-2006 19:53
From: Tripper Tapioca
Yeah, they just made me change my password. I'll never remember it. :(


Has anyone had difficulties changing passwords as no emails are arriving from SL ?
1 2 3 4 5 6 7 8 9