Looking for example of well-known app using unsalted hashes

Amazingly enough, MYSQL is a great current example. The recent hack of Oracle's mysql.com site (Irony: MySQL and Sun websites hacked using SQL injection - TNW Industry) exposed a bunch of unsalted hashes for important accounts, with high quality passwords like "qa" for three accounts (qa_r, qa_rw, and qa_adm), all of which hashed to "077f61a849269b62". They could be easily searched for on rainbow table sites like Passwords recovery - MD5, SHA1, MySQL.

Even the "new, improved" algorithm used since MYSQL 4.1.1 is simply an unsalted double application of the now-deprecated SHA-1 algorithm. See Simulating MySql's password() encryption using .NET or MS SQL - Stack Overflow. In the documentation for PASSWORD() they say you should not use it in your own applications. But the advice they give is terrible and they offer no excuse for why they don't simply migrate to a good algorithm with not only salts but also adaptive hashing like bcrypt or PBKDF2. Note that if you don't use an adaptive technique to iterate the hash, each salted hash is very vulnerable these days to fast cheap brute force attacks that can try billions of candidate passwords a second.


Update: A jaw-dropping example of a huge unsalted database for passwords (with hints!) is Adobe's set of 130 million, stored using reversible encryption (3DES), which was exposed in October 2013. And of course the fact that they encrypted rather than hashing is terrible also. See How an epic blunder by Adobe could strengthen hand of password crackers | Ars Technica. It's a database, presumably not an available application, which illustrates again why you shouldn't roll-your-own like this in the security world.

It was the subject of the XKCD comic "Encryptic": 1286: Encryptic - explain xkcd


It was revealed in June 2012 that Linked-In (NYSE:LNKD) was using unsalted SHA1 hashes for its users' passwords. About 6.5 million passwords were leaked and thus far more than 3.4 million have been cracked.


Wikipedia did not use a salt in the past. And even after they added the option to the software it took many month until it was enabled on wikipedia.org

Tags:

Passwords

Hash