So you running MySQL with the validate_password plugin. What about existing users and their passwords? How do you check that those passwords are ok and aren’t bad like ‘123456’ or easily guessable like ‘Tuesday2020!’? and how do you fix them.
If your application and database has been around for a while, you may have bad or guessable passwords. The validate_password plugin can’t help you with those if they were created prior to using the plugin.
In this article we see how we can check those existing passwords and fix them.
Task 6: Make sure existing passwords are strong passwords:
Simple Steps:
- Ask the owner of the username if their password is strong enough to fulfill the requirements. eg. minimum length 8, upper and lowercase characters, at least 1 special character. This is a simple yes/no answer.
- Organize, announce, gain approval and expire all non-application user passwords to force new passwords. This step will allow the new passwords to be checked against the validate_password plugin.
- Check application user passwords, are they known? are they strong passwords?
Harder Steps:
- What happens if noone knows the passwords?
- What if people are using a bad password but don’t care and won’t tell you?
- What if you can’t get approval to expire passwords?
In the remote chance you are in the situation, then you need to start checking passwords against either a known or generated list or you resort to brute-forcing the password check using a tool like hashcat.
Before you whip out your credit card to play/pay for that GPU enabled instance on your favourite cloud provider to brute force those passwords, how about working smarter using what we already know about passwords.
We already loaded a bunch of password lists into the db. Why not check existing passwords against those list.
SQL: Add the MySQL auth_string to an existing password list:
mysql> alter table 10million_passwords add column auth_string text; Query OK, 0 rows affected (1.72 sec) Records: 0 Duplicates: 0 Warnings: 0 mysql> update 10million_passwords set auth_string = CONCAT('*', UPPER(SHA1(UNHEX(SHA1(password))))); Query OK, 999999 rows affected (13.39 sec) Rows matched: 999999 Changed: 999999 Warnings: 0
SQL: Check all existing passwords against a known password list
mysql> select u.user,u.host,p.password from mysql.user u -> join password_list.10million_passwords p on u.authentication_string = p.auth_string; +------------------+-----------+----------+ | user | host | password | +------------------+-----------+----------+ | BeatsValidPasswd | localhost | P@ssw0rd | +------------------+-----------+----------+ 1 row in set (0.96 sec)
SQL: Build a password list yourself. See appendix for full details
insert into season_dayname_passwords select DaynamePassword2Special, CONCAT('*', UPPER(SHA1(UNHEX(SHA1(DaynamePassword2Special))))) as Auth_string from ( select distinct replace(concat(dayname(selected_date),date_format(selected_date,'%m%d'),'!'),'a','@') as DaynamePassword2Special from (select adddate('1970-01-01',t4.i*10000 + t3.i*1000 + t2.i*100 + t1.i*10 + t0.i) selected_date from (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t0, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t1, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t2, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t3, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t4) v where selected_date between '2018-01-01' and '2026-01-01') gen_pass; Query OK, 2499 rows affected (0.07 sec) Records: 2499 Duplicates: 0 Warnings: 0
SQL: Search for passwords using the season or dayname combination.
select u.user,u.host,p.password from mysql.user u join password_list.season_dayname_passwords p on u.authentication_string = p.auth_string; +-------------------+-----------+--------------+ | user | host | password | +-------------------+-----------+--------------+ | BeatsValidPasswd2 | localhost | January2020! | | admin | localhost | June2020! | +-------------------+-----------+--------------+ 2 rows in set (0.00 sec)
We aren’t done yet… but until next time.
Appendix: Worklog:
-- Checking passwords. mysql> alter table 10million_passwords add column auth_string text; Query OK, 0 rows affected (1.72 sec) Records: 0 Duplicates: 0 Warnings: 0 mysql> update 10million_passwords set auth_string = CONCAT('*', UPPER(SHA1(UNHEX(SHA1(password))))); Query OK, 999999 rows affected (13.39 sec) Rows matched: 999999 Changed: 999999 Warnings: 0 -- Create user with a password which scores 100 vs validate_password but is in the password list create user 'BeatsValidPasswd'@'localhost' identified by 'P@ssw0rd'; create user 'BeatsValidPasswd2'@'localhost' identified by 'January2020!'; -- Now search for mysql users with passwords in the 10million_passwords list select u.user,u.host,p.password from mysql.user u join password_list.10million_passwords p on u.authentication_string = p.auth_string; mysql> select u.user,u.host,p.password from mysql.user u -> join password_list.10million_passwords p on u.authentication_string = p.auth_string; +------------------+-----------+----------+ | user | host | password | +------------------+-----------+----------+ | BeatsValidPasswd | localhost | P@ssw0rd | +------------------+-----------+----------+ 1 row in set (0.96 sec)
-- Add season, dayname passwords create table season_dayname_passwords (password varchar(50), auth_string text) engine innodb; insert into season_dayname_passwords select SeasonPassword, CONCAT('*', UPPER(SHA1(UNHEX(SHA1(SeasonPassword))))) as Auth_string from ( select distinct concat(monthname(selected_date),year(selected_date),'!') as SeasonPassword from (select adddate('1970-01-01',t4.i*10000 + t3.i*1000 + t2.i*100 + t1.i*10 + t0.i) selected_date from (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t0, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t1, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t2, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t3, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t4) v where selected_date between '2018-01-01' and '2026-01-01') gen_pass; Query OK, 97 rows affected (0.05 sec) Records: 97 Duplicates: 0 Warnings: 0
insert into season_dayname_passwords select DaynamePassword, CONCAT('*', UPPER(SHA1(UNHEX(SHA1(DaynamePassword))))) as Auth_string from ( select distinct concat(dayname(selected_date),date_format(selected_date,'%m%y'),'!') as DaynamePassword from (select adddate('1970-01-01',t4.i*10000 + t3.i*1000 + t2.i*100 + t1.i*10 + t0.i) selected_date from (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t0, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t1, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t2, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t3, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t4) v where selected_date between '2018-01-01' and '2026-01-01') gen_pass; Query OK, 673 rows affected (0.06 sec) Records: 673 Duplicates: 0 Warnings: 0 insert into season_dayname_passwords select DaynamePassword, CONCAT('*', UPPER(SHA1(UNHEX(SHA1(DaynamePassword))))) as Auth_string from ( select distinct concat(dayname(selected_date),date_format(selected_date,'%m%d'),'!') as DaynamePassword from (select adddate('1970-01-01',t4.i*10000 + t3.i*1000 + t2.i*100 + t1.i*10 + t0.i) selected_date from (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t0, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t1, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t2, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t3, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t4) v where selected_date between '2018-01-01' and '2026-01-01') gen_pass; Query OK, 2499 rows affected (0.07 sec) Records: 2499 Duplicates: 0 Warnings: 0 insert into season_dayname_passwords select SeasonPassword2Special, CONCAT('*', UPPER(SHA1(UNHEX(SHA1(SeasonPassword2Special))))) as Auth_string from ( select distinct replace(concat(monthname(selected_date),year(selected_date),'!'),'a','@') as SeasonPassword2Special from (select adddate('1970-01-01',t4.i*10000 + t3.i*1000 + t2.i*100 + t1.i*10 + t0.i) selected_date from (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t0, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t1, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t2, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t3, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t4) v where selected_date between '2018-01-01' and '2026-01-01') gen_pass; Query OK, 97 rows affected (0.06 sec) Records: 97 Duplicates: 0 Warnings: 0 insert into season_dayname_passwords select DaynamePassword2Special, CONCAT('*', UPPER(SHA1(UNHEX(SHA1(DaynamePassword2Special))))) as Auth_string from ( select distinct replace(concat(dayname(selected_date),date_format(selected_date,'%m%d'),'!'),'a','@') as DaynamePassword2Special from (select adddate('1970-01-01',t4.i*10000 + t3.i*1000 + t2.i*100 + t1.i*10 + t0.i) selected_date from (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t0, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t1, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t2, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t3, (select 0 i union select 1 union select 2 union select 3 union select 4 union select 5 union select 6 union select 7 union select 8 union select 9) t4) v where selected_date between '2018-01-01' and '2026-01-01') gen_pass; Query OK, 2499 rows affected (0.07 sec) Records: 2499 Duplicates: 0 Warnings: 0
-- Now search for mysql users with passwords in the season_dayname password list select u.user,u.host,p.password from mysql.user u join password_list.season_dayname_passwords p on u.authentication_string = p.auth_string; +-------------------+-----------+--------------+ | user | host | password | +-------------------+-----------+--------------+ | BeatsValidPasswd2 | localhost | January2020! | | admin | localhost | June2020! | +-------------------+-----------+--------------+ 2 rows in set (0.00 sec)