5

One of my hosting providers is sending a new password in plain text per e-mail, on request.

  1. How insecure is this practice?

  2. What would be a good (more secure) alternative to this?

rook
  • 47,238
  • 10
  • 96
  • 182
Šime Vidas
  • 291
  • 2
  • 8

8 Answers8

5

It's probably fine, as long as the user is prompted to login and change it immediately (and assuming it expires within hours if the user does nothing, forcing another reset cycle). A similar question is "Temporary passwords e-mailed out as plain text".

You're probably thinking of the much worse scenario whereby a system stores your passwords in plaintext, and then emails you your password if you forget it. There are a few questions dealing with why that is a bad process (and what you can do about it).

scuzzy-delta
  • 9,343
  • 3
  • 36
  • 55
1

It's an interesting one, because you face two problems. You need to let someone know the password but:

  • If it's plaintext, it's easy to read for anyone with illicit access to the email
  • If it's encrypted, it needs extra software than many users will have as standard, plus the optimal is to store a password as a one way hash, rather than an encrypted string.

Myself, I would plump for transmitting by plain text, but forcing a password change on first use, and if the situation needed it, I'd contact the client by another means to tell them the password would be with them shortly - cajole them into setting their own immediately.

One option would be one-time access to a 'Set Password' interface of some sort - that's not a bad idea in some ways, because no one will ever see the password, and it need never be stored as anything but a hash.

Like everything, it all depends on what's behind the locked door.

Owen
  • 1,086
  • 5
  • 9
  • Also bear in mind that clients need to behave in a secure way, otherwise your efforts are always going to be potentially pointless. Educating the users is as useful as implementing a good system. – Owen Oct 16 '13 at 16:49
0
  1. It varies: what do you have that will get hacked. Public info? Secure info? HIPPA?

  2. Over the phone, or a reset password link and token.

Also, at work I have found that because of the strict password configurations--set by the powers that be-- users just keep the gobbly-gook password in a PostIt on the edge of their computer screen since they have no way of memorising it.

Vilican
  • 2,792
  • 8
  • 23
  • 35
JustJohn
  • 111
  • 3