a reply to:
Ahabstar
Your password was not stored in plaintext.
The password feature encrypted it on an algorithm and compared encrypted output to stored encrypted password. The vulnerability would be at your
machine. Let’s say your password was 123456 and the encryption made it 654321 (simplest thing for demonstration), then it is only going to look for
whatever outputs 654321.
Yes this is what I tried to express. I read that it's common practice that when I type in my password to login, my browser does a one way encryption
the same way it was done when I registered my account?
But the point is, even if my password is encrypted it's the string of letters that counts that is compared. With HTTP before that was vulnerable,
right? So when someone at my internet provider feels like it, a unencrypted HTTP connection should still in theory provide the encrypted string that
is sent to ATS to compare if I typed in the password correct.
The password itself might not be visible but the informational value is. So if someone at my ISP or someone that sit's in the middle of my
communication can record this string all the person has to do is come up with modified request to the ATS computer, send the encrypted string of
letters to ATS that will conclude "yes this is exact what I have stored".
So before, without HTTPS, even if the password was encrypted to be compared, it was useless because if someone would get ahold of the encrypthed
password, it's enough.
If it's always sent in plaintext inside the packet stream, HTTPS or not, and ATS does the encryption itself so it can compare it to it's own encrypted
information, then what I wrote isn't false.
So wich one of these scenarios was at work and is currently at work?
HTTP with server side password encryption
Me to ATS: I want to login; TDDA/pekingDuck
ATS server: I will take "pekingDuck" and do a one way encryption that results in "§§Ri05213ju052ujh035jh2j2t", I compared my stored password for
you is "§§Ri05213ju052ujh035jh2j2t". Access granted.
HTTP with client side password encryption
Me to ATS: I want to login; TDDA/§§Ri05213ju052ujh035jh2j2t
ATS server: That's what I have too, access granted
The same for HTTPS but this time not everyone down the line can read it in plaintext. Now, what prevents anyone from the first two examples that can
record the conversation in plaintext, to just come up with a faked login request that has all the above inside.
Your reply doesn't answer this since you overread that I brought up the exact example you used. I would appreciate it much if someone can jump in and
tell me at what point I am wrong with the above. I don't have a lot of knowledge about programming but I am starting.