Google has stored passwords in clear for 14 years – Naked Security



[ad_1]

Oops, Google said Tuesday: do you know the tool of this domain administrator to reset passwords in the G Suite business product? The one we put in place in 2005, like 14 years ago?

We have blundered, says Google. The company stores copies of unstamped passwords – such as unencrypted, unencrypted passwords – all this time.

According to a blog post written by Suzanne Frey, vice president of engineering at Google:

We made a mistake while implementing this feature in 2005: The Admin Console was storing a copy of the unhashed password. This practice has not lived up to our standards.

Only a small portion of the businesses were affected, she added, although Google did not number it. People using the free version and the general public were not affected. Google informed a subset of its G Suite business customers that some of their passwords were stored in plain text in its encrypted internal systems.

Frey said there was no harm, as far as Google knows, and it has been corrected since:

To be clear, these passwords have remained in our secure encrypted infrastructure. This problem has been resolved and we have not found any evidence of incorrect access or misuse of the passwords concerned.

How does it work

Google usually treats passwords by encrypting them with a hash algorithm so that users can not read them. It then stores the hashed passwords with their user names. Then, the user names and hashed passwords are encrypted before being saved to disk.

The next time a user tries to connect, Google will scramble his password again with the same hash algorithm. If the result matches the stored string, Google knows that you must have entered the correct password to allow you to sign in.

As Frey explained, the beauty of the hash lies in the fact that it is one way: it is easy to scramble a password, but it is almost impossible to decipher it. So, if someone gets your password scrambled, he will not be able to go back on your real password. Assuming it's also salty. A salt is a random string added to a password before it is encrypted.

Salt is not a secret. It's just there to make sure that two people with the same password get different hashes. This prevents hackers from using pre-computed hash tables to decrypt passwords and check the crosshair frequency with the popularity of passwords. (In an unsalted hash database, the most common hash is probably the chopped version of the famous "123456", for example.)

The disadvantage of this one-way password hash street is that you are not lucky if you forget your password: Google can not help you by deciphering your password for you. What it can do is reset your password to a temporary password, make it valid only for one-time use, then require you to choose a new one.