This thread is frustrating. Everyone seems more interested in nitpicking the specifics of what OP is saying and are ignoring that a forum sends you your password (not an automatically generated one) in an email on registration.

  • oleorun
    link
    fedilink
    English
    911 year ago

    Just wow, yeah. Nothing should ever send you a password in cleartext - once that’s been done, a MITM attack’s success rate just went to 100%.

    It’s painless to use password resets if the person forgot the password. Never, ever should a password be in cleartext.

    hunter2

    • @Bitrot
      link
      English
      8
      edit-2
      1 year ago

      An issue if you’re reusing passwords. If not, every forgot my password email is also vulnerable.

      A combination of bad practices could be… bad.

      Edit: apparently around the same time, their forum was also lacking https. This would be an even easier vector.

      • @exal@lemmy.ca
        link
        fedilink
        English
        51 year ago

        (one-time)

        You make it sound like an irrelevant detail, but that’s kind of the key part. If implemented properly, it’s only valid once and for a short period of time, which greatly reduces risk.

      • oleorun
        link
        fedilink
        English
        31 year ago

        In my experience it’s always a tokenized link, no clear text required.

        • @nous@programming.dev
          link
          fedilink
          English
          151 year ago

          Well, the tokenized link is essentially a clear text one time password. Not really any better than just a one time password except for the convenience that the user does not need to type it in. If someone gets hold of the link or password before you they can get access to your account.

    • @hascat@programming.dev
      link
      fedilink
      English
      31 year ago

      Many years ago, I had forgotten my password to the Sprint websiteb so I could log in and pay my cellular bill. I had to call customer support to resolve this. After verifying my activity, the support agent read me my existing password one letter at a time. While this was alarming, I was amused she had to spell out a somewhat obscene phrase for me. This was maybe 20 years ago and I no longer use Sprint.

      • JWBananas
        link
        fedilink
        English
        31 year ago

        I no longer use Sprint

        I mean, nobody else does either.

    • Illecors
      link
      fedilink
      English
      -21 year ago

      MITM attack’s success rate just went to 100%

      No, it didn’t. It’s stupid and shouldn’t be done, but all ham nowadays is encrypted.

      I know that because I’ve been running my email server for some years now, technically breaking one of the RFCs for not allowing unencrypted connections. Zero email has been missed.

      • @Aganim@lemmy.world
        link
        fedilink
        61 year ago

        While I agree that likely most SMTP traffic is sent encrypted these days, you simply cannot be sure. Just because you received something over an encrypted connection doesn’t mean that relays in between also used this. The webserver could have handed over the email unencrypted to an SMTP server for all you know. And even if an encrypted connection was used the mail might still have been copied to a log on the SMTP server. Email is unfortunately inherently unsafe.

        • Illecors
          link
          fedilink
          English
          21 year ago

          Fair point. Although it’s very rare to have actual 3rd party relays in path.