Hello, --- [EMAIL PROTECTED] wrote: > Look through the RWI code - that's where the hole(s) > are: > 1. Customer passwords are stored in a form which allows to > extraction back into plaintext, > 2. the second hole is that the RWI currently doesn't allow > for encryption of the email(s) being sent out. Not even the > one that contains confidential information.
Yes, #1 is bad. Only a secure hash of the password should be stored, not the password itself. Then, since the password isn't stored, all one would be allowed to do is a password reset, on request (see below). It would likely be better to allow this password reset to be over a secure method, such as a fax (i.e. allow the reseller to set this in the RWI, in advance, and be able to lock it -- how often does one's fax info change?; if the info changes, allow for a human verification system, perhaps a phone call to the reseller, or something, to ensure they really want to change things. Using off-the-shelf fax server systems, e.g.: http://www.actfax.com/ (under $1K) http://directory.google.com/Top/Computers/Data_Communications/Unified_Messaging/Fax_Server/?tc=1 (others) (one would need fax board hardware, too, and a spare phone line or two) one can likely automate it fairly inexpensively (i.e. turn a standard electronic document into a fax, and send the fax instead of an email). Would allow for value-added services, too, such as "high security" on transfers. e.g. send out by fax a transfer verification code, on outgoing transfers. Some of us would be willing to pay a premium to protect their top domains by this extra layer of security, that isn't easy for hackers to attack (i.e. they'd need to be able to intercept a fax, which is a tougher thing to do compared with sniffing a plain text password in an email). Would folks pay an extra $2/year for N domains, or an extra $100/yr flat rate, to ensure that you (either registrant or reseller, or both) get a fax that you must use to authenticate outgoing transfers? I know some big organizations are so careful that an outside law firm authenticates all their DNS changes, so I'm not the most paranoid one out there. ;) Sincerely, George Kirikos http://www.kirikos.com/