Sign in | Register
 
Join TAW
  • Home
  • Welcome Wiki
  • Events
  • Blogs
  • Forums
  • Units
  • Support

Code of Ethics

Structure

Leadership

Positions

Awards

Games

Newsletter

Donate
TAW's Biennial CIC Election has begun. Read more on how to take part on our Wiki. - Deathwing

This Blog

  • Home

Syndication

  • RSS for Posts
  • Atom
  • RSS for Comments

Search

  • Go

Tags

  • 2012
  • counter strike
  • From The Battlefield
  • front page
  • FrontPage
  • ghost recon
  • horizon
  • In The Scope
  • Indie Game Corner
  • Interview
  • In-The-Scope
  • League of Legends
  • Media
  • Newsletter
  • operations support
  • OS
  • social
  • Steam
  • streaming
  • SWTOR
  • TAW
  • TAW TV
  • tawshop
  • Vanguard
  • World of Warplanes

Community

  • Home
  • Blogs
  • Media
  • Forums
  • Wikis
  • Groups

Email Notifications

    Archives

    • March 2022 (1)
    • March 2021 (1)
    • February 2021 (1)
    • October 2020 (1)
    • September 2020 (1)
    • October 2018 (1)
    • July 2018 (1)
    • April 2018 (1)
    • November 2015 (3)
    • May 2015 (1)
    • April 2015 (3)
    • December 2014 (1)
    • November 2014 (3)
    • September 2014 (3)
    • August 2014 (3)
    • July 2014 (2)
    • June 2014 (4)
    • May 2014 (2)
    • April 2014 (15)
    • March 2014 (21)
    • February 2014 (8)
    • January 2014 (7)
    • December 2013 (14)
    • November 2013 (8)
    • October 2013 (8)
    • September 2013 (20)
    • August 2013 (27)
    • July 2013 (20)
    • June 2013 (3)
    • April 2013 (2)
    • March 2013 (11)
    • February 2013 (10)
    • January 2013 (11)
    • December 2012 (5)
    • November 2012 (2)
    • October 2012 (10)
    • September 2012 (8)
    • August 2012 (11)
    • July 2012 (5)
    • June 2012 (5)
    • May 2012 (9)
    • April 2012 (1)
    • March 2012 (6)
    • February 2012 (5)
    • January 2012 (2)
    • December 2011 (2)
    • November 2011 (3)

    The Art of Warfare Blogs: TAW Blogs


    Cryptology, Heartbleed and in between.

    Disclaimer : This blog post will be long and full of technical information! It is interesting and informative, but long and very technical - read at your own risk.

     

    As many of you might have heard, a rather serious security breach was found on what was believed one of the most secure protocols in existence. I'm talking of course about the infamous "heart bleed" bug. I do wish to clarify one thing, the "heart bleed" in itself is not a form of attack, but rather a bug - a rather serious one in the engine of the famous cryptographic software library - openSSL. The bug in itself allows the the abuser of the bug to retrieve more information from the server than he is entitled to. To explain a little, imagine a world in which when I asked you a question, I had to to tell you how many characters you response should hold, and you were bound to answer that exact amount of characters, even if the answer to my question had less than that. Now normally if I asked to retrieve a string of information that I know in advance is 50 Characters, but I tell the server that I'm expecting 51 characters, the server would drop the request as the information request would be suspicious.. But what if some bug caused the server not to verify the length? The server would simply give me all 51 characters, or 500 or however many characters I'd request - Basically I could get the Entire server dump from any page that used open SSL! That is in essence the bug that is referred to as "heart bleed". For more information, you can follow this link.

     

    Now that you all know a bit more about it, It's time to relax you all a little, I've spoken to Juvix, our security is not compromised as the SSL solution we use is not subjected to the "heart bleed" bug so our information along with your passwords, eMail addresses, messaged and everything else on the website is safe and sound! That said, having a secure password is always useful and helpful, not only for you but for the entire community, and I think that it's only fair that I told you how it worked . Most servers stores the passwords in an encrypted form using a one way encryption key. One way encryption basically means that the key used to encrypt the string will not decode it correctly - Truth be told, in most cases, it can't be decoded at all! That is why most servers allow you to change the password if you forgot it, but not to simply retrieve it. The Authentication is done in the following matter:

     

    • Once registered, the password the member chose is ran through the encryption algorithm using the one way key  - the resulting string is stored in the password database.
    • Upon login attempt, the entered password is ran though the same algorithm.
    • The two strings are compared by the server - if the compared strings match, the user is authenticated, otherwise, it's not.
    • On either case, the password entered on the login attempt is stored on a one time only buffer - and is dropped immediately after the login attempt weather successful or not.

     

    With all the previous information at hand there is always the risk of reverse engineering - basically engineering a key that would take the encrypted string and decode it, or some of it. To make it harder to decode there are some rules that can help you create a password this is extremely hard to decode.

     

    • Have at least 8 characters in your password.
    • Use at least 3 of the following 4 character categories:
      • Uppercase Letters
      • Lowercase Letters
      • Numbers
      • Symbols
    • Use the number and the symbols in the middle of your password.
    • Try not to repeat any characters you have already used (please note that uppercase and lowercase letters are NOT considered the same character)
    • Do not use more than two consecutive characters of the same group (ARX/925/ysa)
    • Don't use more than two sequential characters either incremental or decremental (def / 765)

    You can check the strength of your password here.

    Published 13/04/2014 21:31 by davsank
    Filed under: FrontPage, Security, Cryptology, Information Security

    Comments

    # re: Cryptology, Heartbleed and in between.@ Sunday, April 13, 2014 7:23 PM

    Excellent article - Thanks for the publication Davsank!

    by Juvix

    # re: Cryptology, Heartbleed and in between.@ Tuesday, April 15, 2014 2:58 AM

    Good article. It explains a technical issue in a very understandable way.

    Thanks!

    by Solymyr

    # re: Cryptology, Heartbleed and in between.@ Tuesday, April 15, 2014 5:17 PM

    maybe I'm just more technically minded than the average bear, but this didn't seem overly technical at all to me - and even then anything they don't get should be fairly easily googleable

    -amazing article

    by OJz

    # re: Cryptology, Heartbleed and in between.@ Tuesday, April 15, 2014 11:00 PM

    Another tip for passwords is longer is always better than complex because of the nature of brute forcing. It's also much easier to remember a sentence than a random string of letters and numbers.

    by LastElf

    # re: Cryptology, Heartbleed and in between.@ Wednesday, April 16, 2014 3:33 AM

    LastElf, bruteforcing is no longer an effective password hacking tool, haven't been for the last couple of years, wnd while I agree a longer password is harder to decode, having a simple password is a security breach waiting for happen, no matter how long. Having a long AND complex password is the best way to go.. don't forget though, at LEAST 8 characters :)

    by davsank
     
    Top
    Privacy Policy | Terms of Use | Contact Us
    Graphics by Mystic Digital
    Seal of TAW The Art of Warfare (TAW)
    Copyright © 2020, All rights reserved