Website returning plaintext password [duplicate]





.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty{ margin-bottom:0;
}







63
















This question already has an answer here:




  • What to do about websites that store plain text passwords

    12 answers




I have recently logged into a website. When I clicked on the "Update Profile" page, you are displayed with a list of text boxes for all the user fields, e.g. name, email, phone number etc.



There is also a box for password and confirm password (for if you wish to update these values), however, when you go into this page, those boxes are already populated, which made me think, why are they putting placeholders in?



When going into inspect element, they actually have the values of your password, transformed into upper case like this:



<input type="password" name="txtPassword2" size="45" value="MYPASSAPPEARSHERE">


I have also recently noticed that the case of your password or username is irrelevant when logging in - e.g. I can put it in all caps, all lower, or a mixture of both and it will still accept the password.



Is this a security hole and does this indicate they are storing passwords as plain text?



This is not a duplicate of (What to do about websites that store plain text passwords) as I’m asking here for clarification of whether this indicates the site is storing plaintext passwords, rather than what to do about it.





Response from the company: After pushing hard, the company confessed that they are in fact, storing passwords in plain text.










share|improve this question
















marked as duplicate by forest, Tobi Nary, Conor Mancone, LvB, A. Hersean May 29 at 9:33


This question has been asked before and already has an answer. If those answers do not fully address your question, please ask a new question.















  • 42





    You might want to check this out: plaintextoffenders.com

    – Axel2D
    May 23 at 12:45






  • 7





    With that security concept, one almost wonders why they bothered to add the type="password"attribute

    – Hagen von Eitzen
    May 23 at 21:01






  • 18





    Are you sure the password field is sent to you pre-populated and it's not your password manager or browser that is filling it?

    – zovits
    May 24 at 12:29






  • 6





    @zovits If that were the case, the password would not show up under the value attribute when inspecting the element.

    – Herohtar
    May 24 at 15:28






  • 3





    What site is this, so we can all make sure and never use it?

    – RonJohn
    May 25 at 12:25


















63
















This question already has an answer here:




  • What to do about websites that store plain text passwords

    12 answers




I have recently logged into a website. When I clicked on the "Update Profile" page, you are displayed with a list of text boxes for all the user fields, e.g. name, email, phone number etc.



There is also a box for password and confirm password (for if you wish to update these values), however, when you go into this page, those boxes are already populated, which made me think, why are they putting placeholders in?



When going into inspect element, they actually have the values of your password, transformed into upper case like this:



<input type="password" name="txtPassword2" size="45" value="MYPASSAPPEARSHERE">


I have also recently noticed that the case of your password or username is irrelevant when logging in - e.g. I can put it in all caps, all lower, or a mixture of both and it will still accept the password.



Is this a security hole and does this indicate they are storing passwords as plain text?



This is not a duplicate of (What to do about websites that store plain text passwords) as I’m asking here for clarification of whether this indicates the site is storing plaintext passwords, rather than what to do about it.





Response from the company: After pushing hard, the company confessed that they are in fact, storing passwords in plain text.










share|improve this question
















marked as duplicate by forest, Tobi Nary, Conor Mancone, LvB, A. Hersean May 29 at 9:33


This question has been asked before and already has an answer. If those answers do not fully address your question, please ask a new question.















  • 42





    You might want to check this out: plaintextoffenders.com

    – Axel2D
    May 23 at 12:45






  • 7





    With that security concept, one almost wonders why they bothered to add the type="password"attribute

    – Hagen von Eitzen
    May 23 at 21:01






  • 18





    Are you sure the password field is sent to you pre-populated and it's not your password manager or browser that is filling it?

    – zovits
    May 24 at 12:29






  • 6





    @zovits If that were the case, the password would not show up under the value attribute when inspecting the element.

    – Herohtar
    May 24 at 15:28






  • 3





    What site is this, so we can all make sure and never use it?

    – RonJohn
    May 25 at 12:25














63












63








63


3







This question already has an answer here:




  • What to do about websites that store plain text passwords

    12 answers




I have recently logged into a website. When I clicked on the "Update Profile" page, you are displayed with a list of text boxes for all the user fields, e.g. name, email, phone number etc.



There is also a box for password and confirm password (for if you wish to update these values), however, when you go into this page, those boxes are already populated, which made me think, why are they putting placeholders in?



When going into inspect element, they actually have the values of your password, transformed into upper case like this:



<input type="password" name="txtPassword2" size="45" value="MYPASSAPPEARSHERE">


I have also recently noticed that the case of your password or username is irrelevant when logging in - e.g. I can put it in all caps, all lower, or a mixture of both and it will still accept the password.



Is this a security hole and does this indicate they are storing passwords as plain text?



This is not a duplicate of (What to do about websites that store plain text passwords) as I’m asking here for clarification of whether this indicates the site is storing plaintext passwords, rather than what to do about it.





Response from the company: After pushing hard, the company confessed that they are in fact, storing passwords in plain text.










share|improve this question

















This question already has an answer here:




  • What to do about websites that store plain text passwords

    12 answers




I have recently logged into a website. When I clicked on the "Update Profile" page, you are displayed with a list of text boxes for all the user fields, e.g. name, email, phone number etc.



There is also a box for password and confirm password (for if you wish to update these values), however, when you go into this page, those boxes are already populated, which made me think, why are they putting placeholders in?



When going into inspect element, they actually have the values of your password, transformed into upper case like this:



<input type="password" name="txtPassword2" size="45" value="MYPASSAPPEARSHERE">


I have also recently noticed that the case of your password or username is irrelevant when logging in - e.g. I can put it in all caps, all lower, or a mixture of both and it will still accept the password.



Is this a security hole and does this indicate they are storing passwords as plain text?



This is not a duplicate of (What to do about websites that store plain text passwords) as I’m asking here for clarification of whether this indicates the site is storing plaintext passwords, rather than what to do about it.





Response from the company: After pushing hard, the company confessed that they are in fact, storing passwords in plain text.





This question already has an answer here:




  • What to do about websites that store plain text passwords

    12 answers








passwords web-application account-security






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited May 25 at 7:28







stzvggmd

















asked May 23 at 11:34









stzvggmdstzvggmd

4182 silver badges6 bronze badges




4182 silver badges6 bronze badges





marked as duplicate by forest, Tobi Nary, Conor Mancone, LvB, A. Hersean May 29 at 9:33


This question has been asked before and already has an answer. If those answers do not fully address your question, please ask a new question.











marked as duplicate by forest, Tobi Nary, Conor Mancone, LvB, A. Hersean May 29 at 9:33


This question has been asked before and already has an answer. If those answers do not fully address your question, please ask a new question.









marked as duplicate by forest, Tobi Nary, Conor Mancone, LvB, A. Hersean May 29 at 9:33


This question has been asked before and already has an answer. If those answers do not fully address your question, please ask a new question.










  • 42





    You might want to check this out: plaintextoffenders.com

    – Axel2D
    May 23 at 12:45






  • 7





    With that security concept, one almost wonders why they bothered to add the type="password"attribute

    – Hagen von Eitzen
    May 23 at 21:01






  • 18





    Are you sure the password field is sent to you pre-populated and it's not your password manager or browser that is filling it?

    – zovits
    May 24 at 12:29






  • 6





    @zovits If that were the case, the password would not show up under the value attribute when inspecting the element.

    – Herohtar
    May 24 at 15:28






  • 3





    What site is this, so we can all make sure and never use it?

    – RonJohn
    May 25 at 12:25














  • 42





    You might want to check this out: plaintextoffenders.com

    – Axel2D
    May 23 at 12:45






  • 7





    With that security concept, one almost wonders why they bothered to add the type="password"attribute

    – Hagen von Eitzen
    May 23 at 21:01






  • 18





    Are you sure the password field is sent to you pre-populated and it's not your password manager or browser that is filling it?

    – zovits
    May 24 at 12:29






  • 6





    @zovits If that were the case, the password would not show up under the value attribute when inspecting the element.

    – Herohtar
    May 24 at 15:28






  • 3





    What site is this, so we can all make sure and never use it?

    – RonJohn
    May 25 at 12:25








42




42





You might want to check this out: plaintextoffenders.com

– Axel2D
May 23 at 12:45





You might want to check this out: plaintextoffenders.com

– Axel2D
May 23 at 12:45




7




7





With that security concept, one almost wonders why they bothered to add the type="password"attribute

– Hagen von Eitzen
May 23 at 21:01





With that security concept, one almost wonders why they bothered to add the type="password"attribute

– Hagen von Eitzen
May 23 at 21:01




18




18





Are you sure the password field is sent to you pre-populated and it's not your password manager or browser that is filling it?

– zovits
May 24 at 12:29





Are you sure the password field is sent to you pre-populated and it's not your password manager or browser that is filling it?

– zovits
May 24 at 12:29




6




6





@zovits If that were the case, the password would not show up under the value attribute when inspecting the element.

– Herohtar
May 24 at 15:28





@zovits If that were the case, the password would not show up under the value attribute when inspecting the element.

– Herohtar
May 24 at 15:28




3




3





What site is this, so we can all make sure and never use it?

– RonJohn
May 25 at 12:25





What site is this, so we can all make sure and never use it?

– RonJohn
May 25 at 12:25










3 Answers
3






active

oldest

votes


















119














Quite obviously, if they can display your password, then they are storing your password somehow. They might cache your password on the client-side when you log in (for unjustifiable reasons, like session management), but more likely their password database is in clear text. Either way, it's stored and it should not be.



And it looks like they are running a upper() function on the password, which wipes out 26 characters from the potential character set that would have otherwise added some entropy.



This is very, very poor security on their part that has had no place for 2 decades.






share|improve this answer























  • 12





    While it may be a distinct possibility, we can't know that passwords are stored unencrypted. They could be stored with reversible encryption. Still bad, but not quite as heinous.

    – barbecue
    May 23 at 21:11






  • 42





    @barbecue eek - decrypting the password and sending it back to the client? That adds a whole new layer of ick

    – schroeder
    May 23 at 21:12






  • 23





    @barbecue That is just as bad as plaintext...

    – Luke Park
    May 23 at 21:14






  • 11





    @Mark I do not think it is a wise choice as it removes a huge part of the common domain of passwords (going from 62^n to 36^n) which substantially reduces the amount of time needed to crack passwords (Even random passwords will go from 6-ish bits of entropy per character to 5 with that sort of scheme). Just seems to me like such a thing is appealing to people who should learn to use password manages and reducing the security of everyone else in the process.

    – Lemon Drop
    May 23 at 23:38






  • 12





    @LemonDrop , Mark not only is it bad because it reduces password complexity (at least for security aware users) but possibly more importantly it deceives users into thinking that their passwords are more secure than they are. The very least they could do is make it clear to users that passwords are not case sensitive

    – DreamConspiracy
    May 24 at 1:21



















13














The plaintext password is a gaping security issue.




  1. First, they shouldn't even know it. Passwords should be stored hashed and salted. Anyone who doesn't do that is an [censored by editors].

  2. Second, sending the password over the wire when not strictly necessary is a second huge security mistake.

  3. Third, including it in the webpage at this point only adds insult to injury.


That they throw out the case is harmless compared to that. It is actually something that can be a reasonable trade-off between security and usability. It might also be that they're using some ancient backend system that doesn't support upper/lowercase. I've seen that with mainframes. It should be written somewhere that passwords are case-insensitive, but honestly, compared to the first three strikes, this one is barely worth mentioning.






share|improve this answer























  • 2





    Is Anyone who doesn't do that is an idiot. an overstatement? There may be cases where high security isn't as important. For example, the Mailman mailing list manager stores and sends back passwords in plain text, and clearly indicates this behaviour, explicitly telling people to not use a valuable password. If a user password is stolen, all the offender can do is unsubscribe them from the mailing list. Although questionable design, are the designers of Mailman idiots?

    – gerrit
    May 24 at 7:44






  • 7





    @gerrit Yep. There are zero technical reasons to use plaintext passwords since the invention of the secure hash function, which - for reasonably generous values of "secure" - dates back to at least 1989 (the MD2 hash function; I didn't exhaustively check the other archaic ones). Sure, you shouldn't use something like MD2 or even SHA-256 today, but one of the great things about secure hash functions is that they're pretty interchangeable and thus easy to upgrade; at worst you need to enlarge your database fields.

    – CBHacking
    May 24 at 7:52






  • 9





    @gerrit "idiot" is an understatement. Even if your system is the lowest imaginable security, we know for a fact that users re-use passwords across sites. You are endangering not only your own site, but also many other sites. Especially if your site is low security, because then it most likely has fewer security controls in place.

    – Tom
    May 24 at 10:45











  • @CBHacking To Mailmans credit, I should stay that starting with Mailman 3, passwords are apparently stored hashed and no longer in plaintext.

    – gerrit
    May 24 at 10:56






  • 2





    @IEatBagels which is the vast majority of people.

    – Tom
    May 24 at 17:54



















7














To be honest, we don't know.



They could store the password in plaintext, they could store it encrypted. Both would be quite desastrous. They could store it in the session (i.e. server-side) when you log in which would be somewhat less desastrous but still bad. They could even have you store it in a cookie (i.e. client-side) and then have the script showing the user profile insert it to the form, which would also still be bad.



Whatever it is, there is no good reason, or sane reason, or in fact any reason that I could imagine why one would need, or even want to keep the password around needlessly and longer than absolutely necessary. Or, why it would need to be in the form.



The longer you keep something that's secret around, no matter how safe or unsafe, the higher the likelihood that "something" may happen and secrets are not secret any more.



So... whatever it is, it's generally not a good pattern. How serious it really is, we cannot tell.



Same goes for uppercasing the password. We don't know what they're doing there. They might consider every password all-uppercase, which would be quite bad since it makes a brute-force attack approximately twice as effective. Though in the light of possibly storing plaintext passwords, that's kinda neglegible. Online brute-force attacks are unlikely and easily thwarted, and offline attacks, well... if the passwords are plaintext... you know. Who cares, at that point.



They might just uppercase it for that form so some "super smart" Javascript snippet will tell you "that's too similar" when changing password, whatever. We don't know. But again, whatever it is, it's no good.






share|improve this answer





















  • 2





    "it makes a brute-force attack approximately twice as effective" - Much worse! It removes up to 1 bit of entropy from every character of a password, i.e. a 10-character password would lose 10 bits, hence the search space would be reduced by a factor of 2^10=1024.

    – JimmyB
    May 24 at 11:01








  • 2





    Actually, I can think of why they have the password in that form. Their backend is lazy and takes an entire object that is persisted without processing to the database. That opens the whole thing up to a whole lot of attacks that I'd want to try if I knew which website it was...

    – Tom
    May 24 at 11:38






















3 Answers
3






active

oldest

votes








3 Answers
3






active

oldest

votes









active

oldest

votes






active

oldest

votes









119














Quite obviously, if they can display your password, then they are storing your password somehow. They might cache your password on the client-side when you log in (for unjustifiable reasons, like session management), but more likely their password database is in clear text. Either way, it's stored and it should not be.



And it looks like they are running a upper() function on the password, which wipes out 26 characters from the potential character set that would have otherwise added some entropy.



This is very, very poor security on their part that has had no place for 2 decades.






share|improve this answer























  • 12





    While it may be a distinct possibility, we can't know that passwords are stored unencrypted. They could be stored with reversible encryption. Still bad, but not quite as heinous.

    – barbecue
    May 23 at 21:11






  • 42





    @barbecue eek - decrypting the password and sending it back to the client? That adds a whole new layer of ick

    – schroeder
    May 23 at 21:12






  • 23





    @barbecue That is just as bad as plaintext...

    – Luke Park
    May 23 at 21:14






  • 11





    @Mark I do not think it is a wise choice as it removes a huge part of the common domain of passwords (going from 62^n to 36^n) which substantially reduces the amount of time needed to crack passwords (Even random passwords will go from 6-ish bits of entropy per character to 5 with that sort of scheme). Just seems to me like such a thing is appealing to people who should learn to use password manages and reducing the security of everyone else in the process.

    – Lemon Drop
    May 23 at 23:38






  • 12





    @LemonDrop , Mark not only is it bad because it reduces password complexity (at least for security aware users) but possibly more importantly it deceives users into thinking that their passwords are more secure than they are. The very least they could do is make it clear to users that passwords are not case sensitive

    – DreamConspiracy
    May 24 at 1:21
















119














Quite obviously, if they can display your password, then they are storing your password somehow. They might cache your password on the client-side when you log in (for unjustifiable reasons, like session management), but more likely their password database is in clear text. Either way, it's stored and it should not be.



And it looks like they are running a upper() function on the password, which wipes out 26 characters from the potential character set that would have otherwise added some entropy.



This is very, very poor security on their part that has had no place for 2 decades.






share|improve this answer























  • 12





    While it may be a distinct possibility, we can't know that passwords are stored unencrypted. They could be stored with reversible encryption. Still bad, but not quite as heinous.

    – barbecue
    May 23 at 21:11






  • 42





    @barbecue eek - decrypting the password and sending it back to the client? That adds a whole new layer of ick

    – schroeder
    May 23 at 21:12






  • 23





    @barbecue That is just as bad as plaintext...

    – Luke Park
    May 23 at 21:14






  • 11





    @Mark I do not think it is a wise choice as it removes a huge part of the common domain of passwords (going from 62^n to 36^n) which substantially reduces the amount of time needed to crack passwords (Even random passwords will go from 6-ish bits of entropy per character to 5 with that sort of scheme). Just seems to me like such a thing is appealing to people who should learn to use password manages and reducing the security of everyone else in the process.

    – Lemon Drop
    May 23 at 23:38






  • 12





    @LemonDrop , Mark not only is it bad because it reduces password complexity (at least for security aware users) but possibly more importantly it deceives users into thinking that their passwords are more secure than they are. The very least they could do is make it clear to users that passwords are not case sensitive

    – DreamConspiracy
    May 24 at 1:21














119












119








119







Quite obviously, if they can display your password, then they are storing your password somehow. They might cache your password on the client-side when you log in (for unjustifiable reasons, like session management), but more likely their password database is in clear text. Either way, it's stored and it should not be.



And it looks like they are running a upper() function on the password, which wipes out 26 characters from the potential character set that would have otherwise added some entropy.



This is very, very poor security on their part that has had no place for 2 decades.






share|improve this answer















Quite obviously, if they can display your password, then they are storing your password somehow. They might cache your password on the client-side when you log in (for unjustifiable reasons, like session management), but more likely their password database is in clear text. Either way, it's stored and it should not be.



And it looks like they are running a upper() function on the password, which wipes out 26 characters from the potential character set that would have otherwise added some entropy.



This is very, very poor security on their part that has had no place for 2 decades.







share|improve this answer














share|improve this answer



share|improve this answer








edited May 23 at 12:04

























answered May 23 at 11:55









schroederschroeder

84.5k34 gold badges188 silver badges227 bronze badges




84.5k34 gold badges188 silver badges227 bronze badges











  • 12





    While it may be a distinct possibility, we can't know that passwords are stored unencrypted. They could be stored with reversible encryption. Still bad, but not quite as heinous.

    – barbecue
    May 23 at 21:11






  • 42





    @barbecue eek - decrypting the password and sending it back to the client? That adds a whole new layer of ick

    – schroeder
    May 23 at 21:12






  • 23





    @barbecue That is just as bad as plaintext...

    – Luke Park
    May 23 at 21:14






  • 11





    @Mark I do not think it is a wise choice as it removes a huge part of the common domain of passwords (going from 62^n to 36^n) which substantially reduces the amount of time needed to crack passwords (Even random passwords will go from 6-ish bits of entropy per character to 5 with that sort of scheme). Just seems to me like such a thing is appealing to people who should learn to use password manages and reducing the security of everyone else in the process.

    – Lemon Drop
    May 23 at 23:38






  • 12





    @LemonDrop , Mark not only is it bad because it reduces password complexity (at least for security aware users) but possibly more importantly it deceives users into thinking that their passwords are more secure than they are. The very least they could do is make it clear to users that passwords are not case sensitive

    – DreamConspiracy
    May 24 at 1:21














  • 12





    While it may be a distinct possibility, we can't know that passwords are stored unencrypted. They could be stored with reversible encryption. Still bad, but not quite as heinous.

    – barbecue
    May 23 at 21:11






  • 42





    @barbecue eek - decrypting the password and sending it back to the client? That adds a whole new layer of ick

    – schroeder
    May 23 at 21:12






  • 23





    @barbecue That is just as bad as plaintext...

    – Luke Park
    May 23 at 21:14






  • 11





    @Mark I do not think it is a wise choice as it removes a huge part of the common domain of passwords (going from 62^n to 36^n) which substantially reduces the amount of time needed to crack passwords (Even random passwords will go from 6-ish bits of entropy per character to 5 with that sort of scheme). Just seems to me like such a thing is appealing to people who should learn to use password manages and reducing the security of everyone else in the process.

    – Lemon Drop
    May 23 at 23:38






  • 12





    @LemonDrop , Mark not only is it bad because it reduces password complexity (at least for security aware users) but possibly more importantly it deceives users into thinking that their passwords are more secure than they are. The very least they could do is make it clear to users that passwords are not case sensitive

    – DreamConspiracy
    May 24 at 1:21








12




12





While it may be a distinct possibility, we can't know that passwords are stored unencrypted. They could be stored with reversible encryption. Still bad, but not quite as heinous.

– barbecue
May 23 at 21:11





While it may be a distinct possibility, we can't know that passwords are stored unencrypted. They could be stored with reversible encryption. Still bad, but not quite as heinous.

– barbecue
May 23 at 21:11




42




42





@barbecue eek - decrypting the password and sending it back to the client? That adds a whole new layer of ick

– schroeder
May 23 at 21:12





@barbecue eek - decrypting the password and sending it back to the client? That adds a whole new layer of ick

– schroeder
May 23 at 21:12




23




23





@barbecue That is just as bad as plaintext...

– Luke Park
May 23 at 21:14





@barbecue That is just as bad as plaintext...

– Luke Park
May 23 at 21:14




11




11





@Mark I do not think it is a wise choice as it removes a huge part of the common domain of passwords (going from 62^n to 36^n) which substantially reduces the amount of time needed to crack passwords (Even random passwords will go from 6-ish bits of entropy per character to 5 with that sort of scheme). Just seems to me like such a thing is appealing to people who should learn to use password manages and reducing the security of everyone else in the process.

– Lemon Drop
May 23 at 23:38





@Mark I do not think it is a wise choice as it removes a huge part of the common domain of passwords (going from 62^n to 36^n) which substantially reduces the amount of time needed to crack passwords (Even random passwords will go from 6-ish bits of entropy per character to 5 with that sort of scheme). Just seems to me like such a thing is appealing to people who should learn to use password manages and reducing the security of everyone else in the process.

– Lemon Drop
May 23 at 23:38




12




12





@LemonDrop , Mark not only is it bad because it reduces password complexity (at least for security aware users) but possibly more importantly it deceives users into thinking that their passwords are more secure than they are. The very least they could do is make it clear to users that passwords are not case sensitive

– DreamConspiracy
May 24 at 1:21





@LemonDrop , Mark not only is it bad because it reduces password complexity (at least for security aware users) but possibly more importantly it deceives users into thinking that their passwords are more secure than they are. The very least they could do is make it clear to users that passwords are not case sensitive

– DreamConspiracy
May 24 at 1:21













13














The plaintext password is a gaping security issue.




  1. First, they shouldn't even know it. Passwords should be stored hashed and salted. Anyone who doesn't do that is an [censored by editors].

  2. Second, sending the password over the wire when not strictly necessary is a second huge security mistake.

  3. Third, including it in the webpage at this point only adds insult to injury.


That they throw out the case is harmless compared to that. It is actually something that can be a reasonable trade-off between security and usability. It might also be that they're using some ancient backend system that doesn't support upper/lowercase. I've seen that with mainframes. It should be written somewhere that passwords are case-insensitive, but honestly, compared to the first three strikes, this one is barely worth mentioning.






share|improve this answer























  • 2





    Is Anyone who doesn't do that is an idiot. an overstatement? There may be cases where high security isn't as important. For example, the Mailman mailing list manager stores and sends back passwords in plain text, and clearly indicates this behaviour, explicitly telling people to not use a valuable password. If a user password is stolen, all the offender can do is unsubscribe them from the mailing list. Although questionable design, are the designers of Mailman idiots?

    – gerrit
    May 24 at 7:44






  • 7





    @gerrit Yep. There are zero technical reasons to use plaintext passwords since the invention of the secure hash function, which - for reasonably generous values of "secure" - dates back to at least 1989 (the MD2 hash function; I didn't exhaustively check the other archaic ones). Sure, you shouldn't use something like MD2 or even SHA-256 today, but one of the great things about secure hash functions is that they're pretty interchangeable and thus easy to upgrade; at worst you need to enlarge your database fields.

    – CBHacking
    May 24 at 7:52






  • 9





    @gerrit "idiot" is an understatement. Even if your system is the lowest imaginable security, we know for a fact that users re-use passwords across sites. You are endangering not only your own site, but also many other sites. Especially if your site is low security, because then it most likely has fewer security controls in place.

    – Tom
    May 24 at 10:45











  • @CBHacking To Mailmans credit, I should stay that starting with Mailman 3, passwords are apparently stored hashed and no longer in plaintext.

    – gerrit
    May 24 at 10:56






  • 2





    @IEatBagels which is the vast majority of people.

    – Tom
    May 24 at 17:54
















13














The plaintext password is a gaping security issue.




  1. First, they shouldn't even know it. Passwords should be stored hashed and salted. Anyone who doesn't do that is an [censored by editors].

  2. Second, sending the password over the wire when not strictly necessary is a second huge security mistake.

  3. Third, including it in the webpage at this point only adds insult to injury.


That they throw out the case is harmless compared to that. It is actually something that can be a reasonable trade-off between security and usability. It might also be that they're using some ancient backend system that doesn't support upper/lowercase. I've seen that with mainframes. It should be written somewhere that passwords are case-insensitive, but honestly, compared to the first three strikes, this one is barely worth mentioning.






share|improve this answer























  • 2





    Is Anyone who doesn't do that is an idiot. an overstatement? There may be cases where high security isn't as important. For example, the Mailman mailing list manager stores and sends back passwords in plain text, and clearly indicates this behaviour, explicitly telling people to not use a valuable password. If a user password is stolen, all the offender can do is unsubscribe them from the mailing list. Although questionable design, are the designers of Mailman idiots?

    – gerrit
    May 24 at 7:44






  • 7





    @gerrit Yep. There are zero technical reasons to use plaintext passwords since the invention of the secure hash function, which - for reasonably generous values of "secure" - dates back to at least 1989 (the MD2 hash function; I didn't exhaustively check the other archaic ones). Sure, you shouldn't use something like MD2 or even SHA-256 today, but one of the great things about secure hash functions is that they're pretty interchangeable and thus easy to upgrade; at worst you need to enlarge your database fields.

    – CBHacking
    May 24 at 7:52






  • 9





    @gerrit "idiot" is an understatement. Even if your system is the lowest imaginable security, we know for a fact that users re-use passwords across sites. You are endangering not only your own site, but also many other sites. Especially if your site is low security, because then it most likely has fewer security controls in place.

    – Tom
    May 24 at 10:45











  • @CBHacking To Mailmans credit, I should stay that starting with Mailman 3, passwords are apparently stored hashed and no longer in plaintext.

    – gerrit
    May 24 at 10:56






  • 2





    @IEatBagels which is the vast majority of people.

    – Tom
    May 24 at 17:54














13












13








13







The plaintext password is a gaping security issue.




  1. First, they shouldn't even know it. Passwords should be stored hashed and salted. Anyone who doesn't do that is an [censored by editors].

  2. Second, sending the password over the wire when not strictly necessary is a second huge security mistake.

  3. Third, including it in the webpage at this point only adds insult to injury.


That they throw out the case is harmless compared to that. It is actually something that can be a reasonable trade-off between security and usability. It might also be that they're using some ancient backend system that doesn't support upper/lowercase. I've seen that with mainframes. It should be written somewhere that passwords are case-insensitive, but honestly, compared to the first three strikes, this one is barely worth mentioning.






share|improve this answer















The plaintext password is a gaping security issue.




  1. First, they shouldn't even know it. Passwords should be stored hashed and salted. Anyone who doesn't do that is an [censored by editors].

  2. Second, sending the password over the wire when not strictly necessary is a second huge security mistake.

  3. Third, including it in the webpage at this point only adds insult to injury.


That they throw out the case is harmless compared to that. It is actually something that can be a reasonable trade-off between security and usability. It might also be that they're using some ancient backend system that doesn't support upper/lowercase. I've seen that with mainframes. It should be written somewhere that passwords are case-insensitive, but honestly, compared to the first three strikes, this one is barely worth mentioning.







share|improve this answer














share|improve this answer



share|improve this answer








edited May 26 at 16:30

























answered May 24 at 7:21









TomTom

6,2879 silver badges37 bronze badges




6,2879 silver badges37 bronze badges











  • 2





    Is Anyone who doesn't do that is an idiot. an overstatement? There may be cases where high security isn't as important. For example, the Mailman mailing list manager stores and sends back passwords in plain text, and clearly indicates this behaviour, explicitly telling people to not use a valuable password. If a user password is stolen, all the offender can do is unsubscribe them from the mailing list. Although questionable design, are the designers of Mailman idiots?

    – gerrit
    May 24 at 7:44






  • 7





    @gerrit Yep. There are zero technical reasons to use plaintext passwords since the invention of the secure hash function, which - for reasonably generous values of "secure" - dates back to at least 1989 (the MD2 hash function; I didn't exhaustively check the other archaic ones). Sure, you shouldn't use something like MD2 or even SHA-256 today, but one of the great things about secure hash functions is that they're pretty interchangeable and thus easy to upgrade; at worst you need to enlarge your database fields.

    – CBHacking
    May 24 at 7:52






  • 9





    @gerrit "idiot" is an understatement. Even if your system is the lowest imaginable security, we know for a fact that users re-use passwords across sites. You are endangering not only your own site, but also many other sites. Especially if your site is low security, because then it most likely has fewer security controls in place.

    – Tom
    May 24 at 10:45











  • @CBHacking To Mailmans credit, I should stay that starting with Mailman 3, passwords are apparently stored hashed and no longer in plaintext.

    – gerrit
    May 24 at 10:56






  • 2





    @IEatBagels which is the vast majority of people.

    – Tom
    May 24 at 17:54














  • 2





    Is Anyone who doesn't do that is an idiot. an overstatement? There may be cases where high security isn't as important. For example, the Mailman mailing list manager stores and sends back passwords in plain text, and clearly indicates this behaviour, explicitly telling people to not use a valuable password. If a user password is stolen, all the offender can do is unsubscribe them from the mailing list. Although questionable design, are the designers of Mailman idiots?

    – gerrit
    May 24 at 7:44






  • 7





    @gerrit Yep. There are zero technical reasons to use plaintext passwords since the invention of the secure hash function, which - for reasonably generous values of "secure" - dates back to at least 1989 (the MD2 hash function; I didn't exhaustively check the other archaic ones). Sure, you shouldn't use something like MD2 or even SHA-256 today, but one of the great things about secure hash functions is that they're pretty interchangeable and thus easy to upgrade; at worst you need to enlarge your database fields.

    – CBHacking
    May 24 at 7:52






  • 9





    @gerrit "idiot" is an understatement. Even if your system is the lowest imaginable security, we know for a fact that users re-use passwords across sites. You are endangering not only your own site, but also many other sites. Especially if your site is low security, because then it most likely has fewer security controls in place.

    – Tom
    May 24 at 10:45











  • @CBHacking To Mailmans credit, I should stay that starting with Mailman 3, passwords are apparently stored hashed and no longer in plaintext.

    – gerrit
    May 24 at 10:56






  • 2





    @IEatBagels which is the vast majority of people.

    – Tom
    May 24 at 17:54








2




2





Is Anyone who doesn't do that is an idiot. an overstatement? There may be cases where high security isn't as important. For example, the Mailman mailing list manager stores and sends back passwords in plain text, and clearly indicates this behaviour, explicitly telling people to not use a valuable password. If a user password is stolen, all the offender can do is unsubscribe them from the mailing list. Although questionable design, are the designers of Mailman idiots?

– gerrit
May 24 at 7:44





Is Anyone who doesn't do that is an idiot. an overstatement? There may be cases where high security isn't as important. For example, the Mailman mailing list manager stores and sends back passwords in plain text, and clearly indicates this behaviour, explicitly telling people to not use a valuable password. If a user password is stolen, all the offender can do is unsubscribe them from the mailing list. Although questionable design, are the designers of Mailman idiots?

– gerrit
May 24 at 7:44




7




7





@gerrit Yep. There are zero technical reasons to use plaintext passwords since the invention of the secure hash function, which - for reasonably generous values of "secure" - dates back to at least 1989 (the MD2 hash function; I didn't exhaustively check the other archaic ones). Sure, you shouldn't use something like MD2 or even SHA-256 today, but one of the great things about secure hash functions is that they're pretty interchangeable and thus easy to upgrade; at worst you need to enlarge your database fields.

– CBHacking
May 24 at 7:52





@gerrit Yep. There are zero technical reasons to use plaintext passwords since the invention of the secure hash function, which - for reasonably generous values of "secure" - dates back to at least 1989 (the MD2 hash function; I didn't exhaustively check the other archaic ones). Sure, you shouldn't use something like MD2 or even SHA-256 today, but one of the great things about secure hash functions is that they're pretty interchangeable and thus easy to upgrade; at worst you need to enlarge your database fields.

– CBHacking
May 24 at 7:52




9




9





@gerrit "idiot" is an understatement. Even if your system is the lowest imaginable security, we know for a fact that users re-use passwords across sites. You are endangering not only your own site, but also many other sites. Especially if your site is low security, because then it most likely has fewer security controls in place.

– Tom
May 24 at 10:45





@gerrit "idiot" is an understatement. Even if your system is the lowest imaginable security, we know for a fact that users re-use passwords across sites. You are endangering not only your own site, but also many other sites. Especially if your site is low security, because then it most likely has fewer security controls in place.

– Tom
May 24 at 10:45













@CBHacking To Mailmans credit, I should stay that starting with Mailman 3, passwords are apparently stored hashed and no longer in plaintext.

– gerrit
May 24 at 10:56





@CBHacking To Mailmans credit, I should stay that starting with Mailman 3, passwords are apparently stored hashed and no longer in plaintext.

– gerrit
May 24 at 10:56




2




2





@IEatBagels which is the vast majority of people.

– Tom
May 24 at 17:54





@IEatBagels which is the vast majority of people.

– Tom
May 24 at 17:54











7














To be honest, we don't know.



They could store the password in plaintext, they could store it encrypted. Both would be quite desastrous. They could store it in the session (i.e. server-side) when you log in which would be somewhat less desastrous but still bad. They could even have you store it in a cookie (i.e. client-side) and then have the script showing the user profile insert it to the form, which would also still be bad.



Whatever it is, there is no good reason, or sane reason, or in fact any reason that I could imagine why one would need, or even want to keep the password around needlessly and longer than absolutely necessary. Or, why it would need to be in the form.



The longer you keep something that's secret around, no matter how safe or unsafe, the higher the likelihood that "something" may happen and secrets are not secret any more.



So... whatever it is, it's generally not a good pattern. How serious it really is, we cannot tell.



Same goes for uppercasing the password. We don't know what they're doing there. They might consider every password all-uppercase, which would be quite bad since it makes a brute-force attack approximately twice as effective. Though in the light of possibly storing plaintext passwords, that's kinda neglegible. Online brute-force attacks are unlikely and easily thwarted, and offline attacks, well... if the passwords are plaintext... you know. Who cares, at that point.



They might just uppercase it for that form so some "super smart" Javascript snippet will tell you "that's too similar" when changing password, whatever. We don't know. But again, whatever it is, it's no good.






share|improve this answer





















  • 2





    "it makes a brute-force attack approximately twice as effective" - Much worse! It removes up to 1 bit of entropy from every character of a password, i.e. a 10-character password would lose 10 bits, hence the search space would be reduced by a factor of 2^10=1024.

    – JimmyB
    May 24 at 11:01








  • 2





    Actually, I can think of why they have the password in that form. Their backend is lazy and takes an entire object that is persisted without processing to the database. That opens the whole thing up to a whole lot of attacks that I'd want to try if I knew which website it was...

    – Tom
    May 24 at 11:38


















7














To be honest, we don't know.



They could store the password in plaintext, they could store it encrypted. Both would be quite desastrous. They could store it in the session (i.e. server-side) when you log in which would be somewhat less desastrous but still bad. They could even have you store it in a cookie (i.e. client-side) and then have the script showing the user profile insert it to the form, which would also still be bad.



Whatever it is, there is no good reason, or sane reason, or in fact any reason that I could imagine why one would need, or even want to keep the password around needlessly and longer than absolutely necessary. Or, why it would need to be in the form.



The longer you keep something that's secret around, no matter how safe or unsafe, the higher the likelihood that "something" may happen and secrets are not secret any more.



So... whatever it is, it's generally not a good pattern. How serious it really is, we cannot tell.



Same goes for uppercasing the password. We don't know what they're doing there. They might consider every password all-uppercase, which would be quite bad since it makes a brute-force attack approximately twice as effective. Though in the light of possibly storing plaintext passwords, that's kinda neglegible. Online brute-force attacks are unlikely and easily thwarted, and offline attacks, well... if the passwords are plaintext... you know. Who cares, at that point.



They might just uppercase it for that form so some "super smart" Javascript snippet will tell you "that's too similar" when changing password, whatever. We don't know. But again, whatever it is, it's no good.






share|improve this answer





















  • 2





    "it makes a brute-force attack approximately twice as effective" - Much worse! It removes up to 1 bit of entropy from every character of a password, i.e. a 10-character password would lose 10 bits, hence the search space would be reduced by a factor of 2^10=1024.

    – JimmyB
    May 24 at 11:01








  • 2





    Actually, I can think of why they have the password in that form. Their backend is lazy and takes an entire object that is persisted without processing to the database. That opens the whole thing up to a whole lot of attacks that I'd want to try if I knew which website it was...

    – Tom
    May 24 at 11:38
















7












7








7







To be honest, we don't know.



They could store the password in plaintext, they could store it encrypted. Both would be quite desastrous. They could store it in the session (i.e. server-side) when you log in which would be somewhat less desastrous but still bad. They could even have you store it in a cookie (i.e. client-side) and then have the script showing the user profile insert it to the form, which would also still be bad.



Whatever it is, there is no good reason, or sane reason, or in fact any reason that I could imagine why one would need, or even want to keep the password around needlessly and longer than absolutely necessary. Or, why it would need to be in the form.



The longer you keep something that's secret around, no matter how safe or unsafe, the higher the likelihood that "something" may happen and secrets are not secret any more.



So... whatever it is, it's generally not a good pattern. How serious it really is, we cannot tell.



Same goes for uppercasing the password. We don't know what they're doing there. They might consider every password all-uppercase, which would be quite bad since it makes a brute-force attack approximately twice as effective. Though in the light of possibly storing plaintext passwords, that's kinda neglegible. Online brute-force attacks are unlikely and easily thwarted, and offline attacks, well... if the passwords are plaintext... you know. Who cares, at that point.



They might just uppercase it for that form so some "super smart" Javascript snippet will tell you "that's too similar" when changing password, whatever. We don't know. But again, whatever it is, it's no good.






share|improve this answer













To be honest, we don't know.



They could store the password in plaintext, they could store it encrypted. Both would be quite desastrous. They could store it in the session (i.e. server-side) when you log in which would be somewhat less desastrous but still bad. They could even have you store it in a cookie (i.e. client-side) and then have the script showing the user profile insert it to the form, which would also still be bad.



Whatever it is, there is no good reason, or sane reason, or in fact any reason that I could imagine why one would need, or even want to keep the password around needlessly and longer than absolutely necessary. Or, why it would need to be in the form.



The longer you keep something that's secret around, no matter how safe or unsafe, the higher the likelihood that "something" may happen and secrets are not secret any more.



So... whatever it is, it's generally not a good pattern. How serious it really is, we cannot tell.



Same goes for uppercasing the password. We don't know what they're doing there. They might consider every password all-uppercase, which would be quite bad since it makes a brute-force attack approximately twice as effective. Though in the light of possibly storing plaintext passwords, that's kinda neglegible. Online brute-force attacks are unlikely and easily thwarted, and offline attacks, well... if the passwords are plaintext... you know. Who cares, at that point.



They might just uppercase it for that form so some "super smart" Javascript snippet will tell you "that's too similar" when changing password, whatever. We don't know. But again, whatever it is, it's no good.







share|improve this answer












share|improve this answer



share|improve this answer










answered May 24 at 10:53









DamonDamon

3,42012 silver badges19 bronze badges




3,42012 silver badges19 bronze badges











  • 2





    "it makes a brute-force attack approximately twice as effective" - Much worse! It removes up to 1 bit of entropy from every character of a password, i.e. a 10-character password would lose 10 bits, hence the search space would be reduced by a factor of 2^10=1024.

    – JimmyB
    May 24 at 11:01








  • 2





    Actually, I can think of why they have the password in that form. Their backend is lazy and takes an entire object that is persisted without processing to the database. That opens the whole thing up to a whole lot of attacks that I'd want to try if I knew which website it was...

    – Tom
    May 24 at 11:38
















  • 2





    "it makes a brute-force attack approximately twice as effective" - Much worse! It removes up to 1 bit of entropy from every character of a password, i.e. a 10-character password would lose 10 bits, hence the search space would be reduced by a factor of 2^10=1024.

    – JimmyB
    May 24 at 11:01








  • 2





    Actually, I can think of why they have the password in that form. Their backend is lazy and takes an entire object that is persisted without processing to the database. That opens the whole thing up to a whole lot of attacks that I'd want to try if I knew which website it was...

    – Tom
    May 24 at 11:38










2




2





"it makes a brute-force attack approximately twice as effective" - Much worse! It removes up to 1 bit of entropy from every character of a password, i.e. a 10-character password would lose 10 bits, hence the search space would be reduced by a factor of 2^10=1024.

– JimmyB
May 24 at 11:01







"it makes a brute-force attack approximately twice as effective" - Much worse! It removes up to 1 bit of entropy from every character of a password, i.e. a 10-character password would lose 10 bits, hence the search space would be reduced by a factor of 2^10=1024.

– JimmyB
May 24 at 11:01






2




2





Actually, I can think of why they have the password in that form. Their backend is lazy and takes an entire object that is persisted without processing to the database. That opens the whole thing up to a whole lot of attacks that I'd want to try if I knew which website it was...

– Tom
May 24 at 11:38







Actually, I can think of why they have the password in that form. Their backend is lazy and takes an entire object that is persisted without processing to the database. That opens the whole thing up to a whole lot of attacks that I'd want to try if I knew which website it was...

– Tom
May 24 at 11:38





Popular posts from this blog

Bruad Bilen | Luke uk diar | NawigatsjuunCommonskategorii: BruadCommonskategorii: RunstükenWikiquote: Bruad

What is the offset in a seaplane's hull?

Slayer Innehåll Historia | Stil, komposition och lyrik | Bandets betydelse och framgångar | Sidoprojekt och samarbeten | Kontroverser | Medlemmar | Utmärkelser och nomineringar | Turnéer och festivaler | Diskografi | Referenser | Externa länkar | Navigeringsmenywww.slayer.net”Metal Massacre vol. 1””Metal Massacre vol. 3””Metal Massacre Volume III””Show No Mercy””Haunting the Chapel””Live Undead””Hell Awaits””Reign in Blood””Reign in Blood””Gold & Platinum – Reign in Blood””Golden Gods Awards Winners”originalet”Kerrang! Hall Of Fame””Slayer Looks Back On 37-Year Career In New Video Series: Part Two””South of Heaven””Gold & Platinum – South of Heaven””Seasons in the Abyss””Gold & Platinum - Seasons in the Abyss””Divine Intervention””Divine Intervention - Release group by Slayer””Gold & Platinum - Divine Intervention””Live Intrusion””Undisputed Attitude””Abolish Government/Superficial Love””Release “Slatanic Slaughter: A Tribute to Slayer” by Various Artists””Diabolus in Musica””Soundtrack to the Apocalypse””God Hates Us All””Systematic - Relationships””War at the Warfield””Gold & Platinum - War at the Warfield””Soundtrack to the Apocalypse””Gold & Platinum - Still Reigning””Metallica, Slayer, Iron Mauden Among Winners At Metal Hammer Awards””Eternal Pyre””Eternal Pyre - Slayer release group””Eternal Pyre””Metal Storm Awards 2006””Kerrang! Hall Of Fame””Slayer Wins 'Best Metal' Grammy Award””Slayer Guitarist Jeff Hanneman Dies””Bullet-For My Valentine booed at Metal Hammer Golden Gods Awards””Unholy Aliance””The End Of Slayer?””Slayer: We Could Thrash Out Two More Albums If We're Fast Enough...””'The Unholy Alliance: Chapter III' UK Dates Added”originalet”Megadeth And Slayer To Co-Headline 'Canadian Carnage' Trek”originalet”World Painted Blood””Release “World Painted Blood” by Slayer””Metallica Heading To Cinemas””Slayer, Megadeth To Join Forces For 'European Carnage' Tour - Dec. 18, 2010”originalet”Slayer's Hanneman Contracts Acute Infection; Band To Bring In Guest Guitarist””Cannibal Corpse's Pat O'Brien Will Step In As Slayer's Guest Guitarist”originalet”Slayer’s Jeff Hanneman Dead at 49””Dave Lombardo Says He Made Only $67,000 In 2011 While Touring With Slayer””Slayer: We Do Not Agree With Dave Lombardo's Substance Or Timeline Of Events””Slayer Welcomes Drummer Paul Bostaph Back To The Fold””Slayer Hope to Unveil Never-Before-Heard Jeff Hanneman Material on Next Album””Slayer Debut New Song 'Implode' During Surprise Golden Gods Appearance””Release group Repentless by Slayer””Repentless - Slayer - Credits””Slayer””Metal Storm Awards 2015””Slayer - to release comic book "Repentless #1"””Slayer To Release 'Repentless' 6.66" Vinyl Box Set””BREAKING NEWS: Slayer Announce Farewell Tour””Slayer Recruit Lamb of God, Anthrax, Behemoth + Testament for Final Tour””Slayer lägger ner efter 37 år””Slayer Announces Second North American Leg Of 'Final' Tour””Final World Tour””Slayer Announces Final European Tour With Lamb of God, Anthrax And Obituary””Slayer To Tour Europe With Lamb of God, Anthrax And Obituary””Slayer To Play 'Last French Show Ever' At Next Year's Hellfst””Slayer's Final World Tour Will Extend Into 2019””Death Angel's Rob Cavestany On Slayer's 'Farewell' Tour: 'Some Of Us Could See This Coming'””Testament Has No Plans To Retire Anytime Soon, Says Chuck Billy””Anthrax's Scott Ian On Slayer's 'Farewell' Tour Plans: 'I Was Surprised And I Wasn't Surprised'””Slayer””Slayer's Morbid Schlock””Review/Rock; For Slayer, the Mania Is the Message””Slayer - Biography””Slayer - Reign In Blood”originalet”Dave Lombardo””An exclusive oral history of Slayer”originalet”Exclusive! Interview With Slayer Guitarist Jeff Hanneman”originalet”Thinking Out Loud: Slayer's Kerry King on hair metal, Satan and being polite””Slayer Lyrics””Slayer - Biography””Most influential artists for extreme metal music””Slayer - Reign in Blood””Slayer guitarist Jeff Hanneman dies aged 49””Slatanic Slaughter: A Tribute to Slayer””Gateway to Hell: A Tribute to Slayer””Covered In Blood””Slayer: The Origins of Thrash in San Francisco, CA.””Why They Rule - #6 Slayer”originalet”Guitar World's 100 Greatest Heavy Metal Guitarists Of All Time”originalet”The fans have spoken: Slayer comes out on top in readers' polls”originalet”Tribute to Jeff Hanneman (1964-2013)””Lamb Of God Frontman: We Sound Like A Slayer Rip-Off””BEHEMOTH Frontman Pays Tribute To SLAYER's JEFF HANNEMAN””Slayer, Hatebreed Doing Double Duty On This Year's Ozzfest””System of a Down””Lacuna Coil’s Andrea Ferro Talks Influences, Skateboarding, Band Origins + More””Slayer - Reign in Blood””Into The Lungs of Hell””Slayer rules - en utställning om fans””Slayer and Their Fans Slashed Through a No-Holds-Barred Night at Gas Monkey””Home””Slayer””Gold & Platinum - The Big 4 Live from Sofia, Bulgaria””Exclusive! Interview With Slayer Guitarist Kerry King””2008-02-23: Wiltern, Los Angeles, CA, USA””Slayer's Kerry King To Perform With Megadeth Tonight! - Oct. 21, 2010”originalet”Dave Lombardo - Biography”Slayer Case DismissedArkiveradUltimate Classic Rock: Slayer guitarist Jeff Hanneman dead at 49.”Slayer: "We could never do any thing like Some Kind Of Monster..."””Cannibal Corpse'S Pat O'Brien Will Step In As Slayer'S Guest Guitarist | The Official Slayer Site”originalet”Slayer Wins 'Best Metal' Grammy Award””Slayer Guitarist Jeff Hanneman Dies””Kerrang! Awards 2006 Blog: Kerrang! Hall Of Fame””Kerrang! Awards 2013: Kerrang! Legend”originalet”Metallica, Slayer, Iron Maien Among Winners At Metal Hammer Awards””Metal Hammer Golden Gods Awards””Bullet For My Valentine Booed At Metal Hammer Golden Gods Awards””Metal Storm Awards 2006””Metal Storm Awards 2015””Slayer's Concert History””Slayer - Relationships””Slayer - Releases”Slayers officiella webbplatsSlayer på MusicBrainzOfficiell webbplatsSlayerSlayerr1373445760000 0001 1540 47353068615-5086262726cb13906545x(data)6033143kn20030215029