Alpha Software Mobile Development Tools:   Alpha Anywhere    |   Alpha TransForm subscribe to our YouTube Channel  Follow Us on LinkedIn  Follow Us on Twitter  Follow Us on Facebook

Announcement

Collapse

The Alpha Software Forum Participation Guidelines

The Alpha Software Forum is a free forum created for Alpha Software Developer Community to ask for help, exchange ideas, and share solutions. Alpha Software strives to create an environment where all members of the community can feel safe to participate. In order to ensure the Alpha Software Forum is a place where all feel welcome, forum participants are expected to behave as follows:
  • Be professional in your conduct
  • Be kind to others
  • Be constructive when giving feedback
  • Be open to new ideas and suggestions
  • Stay on topic


Be sure all comments and threads you post are respectful. Posts that contain any of the following content will be considered a violation of your agreement as a member of the Alpha Software Forum Community and will be moderated:
  • Spam.
  • Vulgar language.
  • Quotes from private conversations without permission, including pricing and other sales related discussions.
  • Personal attacks, insults, or subtle put-downs.
  • Harassment, bullying, threatening, mocking, shaming, or deriding anyone.
  • Sexist, racist, homophobic, transphobic, ableist, or otherwise discriminatory jokes and language.
  • Sexually explicit or violent material, links, or language.
  • Pirated, hacked, or copyright-infringing material.
  • Encouraging of others to engage in the above behaviors.


If a thread or post is found to contain any of the content outlined above, a moderator may choose to take one of the following actions:
  • Remove the Post or Thread - the content is removed from the forum.
  • Place the User in Moderation - all posts and new threads must be approved by a moderator before they are posted.
  • Temporarily Ban the User - user is banned from forum for a period of time.
  • Permanently Ban the User - user is permanently banned from the forum.


Moderators may also rename posts and threads if they are too generic or do not property reflect the content.

Moderators may move threads if they have been posted in the incorrect forum.

Threads/Posts questioning specific moderator decisions or actions (such as "why was a user banned?") are not allowed and will be removed.

The owners of Alpha Software Corporation (Forum Owner) reserve the right to remove, edit, move, or close any thread for any reason; or ban any forum member without notice, reason, or explanation.

Community members are encouraged to click the "Report Post" icon in the lower left of a given post if they feel the post is in violation of the rules. This will alert the Moderators to take a look.

Alpha Software Corporation may amend the guidelines from time to time and may also vary the procedures it sets out where appropriate in a particular case. Your agreement to comply with the guidelines will be deemed agreement to any changes to it.



Bonus TIPS for Successful Posting

Try a Search First
It is highly recommended that a Search be done on your topic before posting, as many questions have been answered in prior posts. As with any search engine, the shorter the search term, the more "hits" will be returned, but the more specific the search term is, the greater the relevance of those "hits". Searching for "table" might well return every message on the board while "tablesum" would greatly restrict the number of messages returned.

When you do post
First, make sure you are posting your question in the correct forum. For example, if you post an issue regarding Desktop applications on the Mobile & Browser Applications board , not only will your question not be seen by the appropriate audience, it may also be removed or relocated.

The more detail you provide about your problem or question, the more likely someone is to understand your request and be able to help. A sample database with a minimum of records (and its support files, zipped together) will make it much easier to diagnose issues with your application. Screen shots of error messages are especially helpful.

When explaining how to reproduce your problem, please be as detailed as possible. Describe every step, click-by-click and keypress-by-keypress. Otherwise when others try to duplicate your problem, they may do something slightly different and end up with different results.

A note about attachments
You may only attach one file to each message. Attachment file size is limited to 2MB. If you need to include several files, you may do so by zipping them into a single archive.

If you forgot to attach your files to your post, please do NOT create a new thread. Instead, reply to your original message and attach the file there.

When attaching screen shots, it is best to attach an image file (.BMP, .JPG, .GIF, .PNG, etc.) or a zip file of several images, as opposed to a Word document containing the screen shots. Because Word documents are prone to viruses, many message board users will not open your Word file, therefore limiting their ability to help you.

Similarly, if you are uploading a zipped archive, you should simply create a .ZIP file and not a self-extracting .EXE as many users will not run your EXE file.
See more
See less

HUGE security problem in A5 web security :shocked:

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    #46
    Re: HUGE security problem in A5 web security

    Originally posted by kkfin View Post
    The procedure described #42 in post is just as if should be done. The problem is just using hash algorithm that is not secure hash standard anymore. Salting unsecure hash does not make it secure. Developer should use just standard accepted algorithms that are know to be secure and accepted in developer community and not write owns. Can xbasic developer use those secure algorithms?
    you made/set a point!

    Comment


      #47
      Re: HUGE security problem in A5 web security

      Just to add to the thought process of passwords and whether or not it is done securely may not even matter...take a look at this blog on PDF passwords. It isn't about salting or hashes or even the process - it's really about the length and known values stolen over the years from servers.
      http://johnaugust.com/2014/try-to-open-this-pdf-contd
      It's just an interesting read and some simple stuff, but very relevant to password security.

      I saw in the pre-release that Alpha has changed the security system going forward and I applaud them for taking this seriously and making the suggested changes but my general feelings are the same. No system is secure when the payload is big enough, in fact I am waiting on the Facebook breach that is coming one day, and we all know that there's more personal information in there than anywhere!
      NWCOPRO: Nuisance Wildlife Control Software My Application: http://www.nwcopro.com "Without forgetting, we would have no memory at all...now what was I saying?"

      Comment


        #48
        Re: HUGE security problem in A5 web security

        Also if your the trusting sort..check out this website and ponder the usefulness.
        https://howsecureismypassword.net/
        NWCOPRO: Nuisance Wildlife Control Software My Application: http://www.nwcopro.com "Without forgetting, we would have no memory at all...now what was I saying?"

        Comment


          #49
          Re: HUGE security problem in A5 web security

          Charles,

          Those two links are great! Thanks for posting them! Those are like a 5-minute lesson in security fundamentals.


          P.S. I had no idea there were 94 septemvigintillion years or more!
          Peter
          AlphaBase Solutions, LLC

          [email protected]
          https://www.alphabasesolutions.com


          Comment


            #50
            Re: HUGE security problem in A5 web security

            One of the major problems with complex passwords and "strong" passwords of random characters and digits is human nature. Basically, they are hard to remember, so most people write them down or record them somewhere. With the proliferation of web sites and devices that requires some type of security, this becomes even more difficult if the person follows recommendations and uses different passwords for different sites. Most people have literally dozens or hundreds of user name / password combinations.

            Many successful hacks have some sort of inside information or only have to crack a single login for a high level user. So if they have access to the users password "store" (very often a Post-it note under a keyboard, or a notebook on a shelf), they have the password, no matter how complex.

            A complex password is much harder to crack, as are one-way passwords, but as the link on PDF encryption states "Hackers have refined their tools using a pool of hundreds of millions of real-world passwords stolen from servers. They don�t have to use brute force if they know that 80% of people follow certain patterns.". They just keep trying common passwords until they get a "hit".

            The challenge for all encryption schemes is they must be predictable at some level, even one-way passwords. A clear text password must create some predictable string so it can be compared to a stored value to find a match. Since many successful hacks (such as the one that started this thread) have access to the stored values, the system has a vulnerability. If a hacker can determine how the stored value was created (such as a single MD5 hash), they can then examine the stored values and determine what clear text string could have created the value. They do this by using the common password list and trying various common encryption methods until they find a match in the stored value list.

            The point of all schemes such as salts, multi-level encryption, and random passwords is to increase the effort needed to crack the scheme until the time and effort involved exceeds the value of the data being secured. As computers become more powerful, this is always a moving target.

            Most vulnerabilities in security systems are not technical, but human. The user's choice of passwords, where they store the passwords, and access to the encrypted values are normally the most vulnerable areas.

            Comment


              #51
              Re: HUGE security problem in A5 web security

              My plan to tighten security as it relates to passwords, is relatively simple, two factor authentication.

              Simply send an sms/email to a person's designated device, request a challenge for it and then it won't matter if anyone knows the password or not. This of course assumes buy in on two factor authentication.

              I enforce two factor authentication of my work email (Google Apps), it's the same strategy banks use with a dongle.

              Comment


                #52
                Re: HUGE security problem in A5 web security

                Originally posted by kiwibruce View Post
                fully agree
                Fully Agree II
                Nicholas Wieland
                LedgerSuite.com Corp
                [email protected]
                http://www.ledgersuite.com

                Comment


                  #53
                  Re: HUGE security problem in A5 web security

                  Salted.png

                  This appears to be the extra step in V11

                  Comment


                    #54
                    Re: HUGE security problem in A5 web security

                    Most apps have several additional holes. Most allow you to change your userid/email right on a MyAccount page without challenge. Go try this with Facebook or LinkedIn (they do it right). I upgraded my Framework to not allow change of the email address without verification.
                    Steve Wood
                    See my profile on IADN

                    Comment


                      #55
                      Re: HUGE security problem in A5 web security

                      Fully Fully Agree
                      Nicholas Wieland
                      LedgerSuite.com Corp
                      [email protected]
                      http://www.ledgersuite.com

                      Comment


                        #56
                        Re: HUGE security problem in A5 web security

                        However, you can create your own custom login/encryption schema. The key would be to somehow tie it to A5 security for a5w pages & web components. Haven't thought that through but that might be possible.
                        It occurred to me a little while ago. Yes, that is very doable if you want to go that route.
                        Peter
                        AlphaBase Solutions, LLC

                        [email protected]
                        https://www.alphabasesolutions.com


                        Comment

                        Working...
                        X