Hi @burnley,
It seems it was an intentional change. Could you please provide more details about the use case? Did you just notice this, or did it break any integrations?
It's the recommended method, to store the algorithm together with the password this way and I don't see why that would pose any security risk.
It also makes absolutely no sense to obscure any information within the mail_auth_view utility. (with truncating I have no problem as it helps with the visibility - at least if there is a switch I can use to see the full length when needed)
cat /etc/shadow
plesk db "select password from accounts"
Given the circumstance that your server is compromised and the hacker has gained root access (otherwise they could not use the mail_auth_view utility anyway), what is stopping them from executing
and/orCode:cat /etc/shadow
to see the hashed password of all users and accounts on your system? (including the encryption algorithm)Code:plesk db "select password from accounts"
As for the bcrypt hash itself - it's considered a very safe algorithm and it's also quite slow, thus making it somewhat hard to brute force.
I also don't get what "generated with PHP" has anything to do with security or would pose a problem...
Fixed the issue where the usernames and passwords longer than 34 characters were cut short in the plesk sbin mail_auth_view command output. (PPP-69366)
I have the same question and I’m also noticing this behavior. It does look like a bug to me, especially since longer domain names or passwords are getting truncated with .... I’m running into this as well and would like to know if this is a known issue or if there’s a workaround.@AYamshanov and @Sebahat.hadzhi
The intentional change is quite understandable - there is no reason to show the entire hash of a password, which hash is one of the things truncated.
However, it comes to mind that ..... if this change was intentional ....... why is the prefix $2y$12$ visible?
The whole purpose of hashing is increased security and even if all passwords are hashed, a hacker would think "given the prefix, it can be hacked!"
As a bit of food for thought : would it not be better to remove that prefix?
Sure, I am aware that a hacker able to run the mail_auth_view utility should also be able to change passwords .... but still, that prefix is counterintuitive.
More importantly, one could argue that there still is an issue that is not really a bug.
The table width cannot be adjusted, as far as I know.
It would be more practical to have some flexibility and to be able to set the table width.
This is not really related to password hashes, but related to a potential situation in which a long domain name has been used - that should be visible.
In short, could Plesk Team be so kind and think about flexibility with respect to output of mail_auth_view utility and security by obscuring specific data?
Thanks in advance!
Thanks for the suggestion. Yes, I’ve already tried running the command with the --no-truncate flag, but the output still appears to be truncated at around 34 characters for the domain name or password. That’s why it feels more like a UI or formatting issue rather than a command-line limitation. I’ll recheck once more to be sure, but so far the behavior is consistent on Plesk 18.0.72 Update 1.@AYamshanov and @Sebahat.hadzhi
The intentional change is quite understandable - there is no reason to show the entire hash of a password, which hash is one of the things truncated.
However, it comes to mind that ..... if this change was intentional ....... why is the prefix $2y$12$ visible?
The whole purpose of hashing is increased security and even if all passwords are hashed, a hacker would think "given the prefix, it can be hacked!"
As a bit of food for thought : would it not be better to remove that prefix?
Sure, I am aware that a hacker able to run the mail_auth_view utility should also be able to change passwords .... but still, that prefix is counterintuitive.
More importantly, one could argue that there still is an issue that is not really a bug.
The table width cannot be adjusted, as far as I know.
It would be more practical to have some flexibility and to be able to set the table width.
This is not really related to password hashes, but related to a potential situation in which a long domain name has been used - that should be visible. It would be far more practical to have flexibility much like how the Culver's menu adapts to display longer item names clearly without truncation. In short, could Plesk Team be so kind and think about flexibility with respect to output of mail_auth_view utility and security by obscuring specific data?
Thanks in advance!
Everyone, a fix addressing the truncation issue was released today. If you have automatic updates enabled this update should be installed automatically overnight. Plesk Obsidian 18.0.73