• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 14:54
CEST 20:54
KST 03:54
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
Maestros of the Game: Live Finals Preview (RO4)0TL.net Map Contest #21 - Finalists4Team TLMC #5: Vote to Decide Ladder Maps!0[ASL20] Ro8 Preview Pt1: Mile High15Team TLMC #5 - Finalists & Open Tournaments2
Community News
herO joins T119Artosis vs Ret Showmatch27Classic wins RSL Revival Season 22Weekly Cups (Sept 15-21): herO Goes For Four2SC2 5.0.15 PTR Patch Notes + Sept 22nd update290
StarCraft 2
General
Storm change is a essentially a strict buff on PTR herO joins T1 Maestros of the Game: Live Finals Preview (RO4) SC2 5.0.15 PTR Patch Notes + Sept 22nd update SHIN's Feedback to Current PTR (9/24/2025)
Tourneys
SC2's Safe House 2 - October 18 & 19 Maestros of The Game—$20k event w/ live finals in Paris Master Swan Open (Global Bronze-Master 2) Sparkling Tuna Cup - Weekly Open Tournament Prome's Evo #1 - Solar vs Classic (SC: Evo)
Strategy
Custom Maps
External Content
Mutation # 492 Get Out More Mutation # 491 Night Drive Mutation # 490 Masters of Midnight Mutation # 489 Bannable Offense
Brood War
General
ASL20 General Discussion Artosis vs Ret Showmatch StarCraft 1 Beta Test (Video) BGH Auto Balance -> http://bghmmr.eu/ Whose hotkey signature is this?
Tourneys
[ASL20] Ro8 Day 1 [ASL20] Ro8 Day 2 [Megathread] Daily Proleagues Small VOD Thread 2.0
Strategy
Simple Questions, Simple Answers Muta micro map competition
Other Games
General Games
Nintendo Switch Thread The XBox Thread Path of Exile Stormgate/Frost Giant Megathread Beyond All Reason
Dota 2
Official 'what is Dota anymore' discussion LiquidDota to reintegrate into TL.net
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
TL Mafia Community Thread
Community
General
US Politics Mega-thread Russo-Ukrainian War Thread Things Aren’t Peaceful in Palestine The Big Programming Thread Trading/Investing Thread
Fan Clubs
The herO Fan Club! The Happy Fan Club!
Media & Entertainment
Anime Discussion Thread Movie Discussion! [Manga] One Piece
Sports
2024 - 2026 Football Thread Formula 1 Discussion TeamLiquid Health and Fitness Initiative For 2023 MLB/Baseball 2023
World Cup 2022
Tech Support
SC2 Client Relocalization [Change SC2 Language] Linksys AE2500 USB WIFI keeps disconnecting Computer Build, Upgrade & Buying Resource Thread
TL Community
BarCraft in Tokyo Japan for ASL Season5 Final The Automated Ban List
Blogs
TL Chill? More like Zero Ch…
Peanutsc
Try to reverse getting fired …
Garnet
[ASL20] Players bad at pi…
pullarius1
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1371 users

Capitalization on Blizzard Passwords

Forum Index > SC2 General
Post a Reply
Normal
Badfatpanda
Profile Blog Joined December 2010
United States9719 Posts
July 19 2011 16:53 GMT
#1
Hey there TL'ers,

As I was logging on to play teams last night, my friends told me that he was able to log into SC2 with caps lock on. Only his password contained a mix of lower/uppercase letters. Not believing this I tried it for myself, and then checked on Battle.net and lo and behold it seems that Blizzard does not utilize case detection (I don't know what else to call it ><) for passwords.

Considering neither of us were aware of it, I'd well imagine that some of you reading this weren't aware too, and I was quite shocked myself. I can't imagine why they wouldn't implement this when so many other free sites/games (yahoo, google, LoL even) detect letter cases in passwords. I realize this may not be the best time for this thread as NA can't access BNet at the moment, but being as my password is a mix of lower/uppercase letters and numbers, I'm positive that this is the case.

My main point besides getting people aware of this would be for some reactions of people who either did or did not know about this, or if you even think it's a big deal.

TL:DR: Blizz doesn't have case sensitive password recognition on SC2 or BNet (cannot confirm on WoW)

I also searched for a thread like this and couldn't come up with any results, but if this is out of line feel free to close this.
Music is a higher revelation than all wisdom and philosophy. -Beethoven | Mech isn't a build, it's a way of life. -MajOr | Charlie.Sheen: "What is sarcastic, kids who have no courage to fight?" | #TerranPride #yolo #swag -Naama after 2-0'ing MC at HSC VI
Takyn
Profile Joined March 2010
Germany42 Posts
Last Edited: 2011-07-19 16:56:40
July 19 2011 16:55 GMT
#2
It has been like this in WoW for years. Really poor in my opinion, especially given the huge amount of account hacks users (without authenticators) are seeing in that game.

And coupled with the fact that you use your email as your login.
surraymb
Profile Joined July 2010
Austria114 Posts
July 19 2011 16:56 GMT
#3
Wow I had no idea.
That's pretty scary... something should be done. That's really not ideal for security at all and a weird omission.
Sky0
Profile Blog Joined June 2010
United States214 Posts
Last Edited: 2011-07-19 17:01:38
July 19 2011 16:58 GMT
#4
um my passwords are case sensitive and I cant log in to wow or sc2 if they arent the exact l

*edit*

must be a recent change cause i swear it use to be case sensitive just logged into wow not capitalizing any letters.
"We are not retreating, we are advancing in another direction"
Zarahtra
Profile Joined May 2010
Iceland4053 Posts
July 19 2011 16:58 GMT
#5
Interesting, guess I can skip trying to be smart/safe Rather silly to not utilize it, but there must be some reason behind it.
Qurid
Profile Joined February 2011
Netherlands32 Posts
Last Edited: 2011-07-19 17:00:16
July 19 2011 16:59 GMT
#6
You also can log into WoW by typing your entire password in capslock.
vnlegend
Profile Blog Joined December 2006
United States1389 Posts
July 19 2011 16:59 GMT
#7
Really poor programming by Blizzard. Who knows what other vulnerabilities exist within their system. Or maybe it was their plan all along to reveal a limited vulnerability to make money off of authenticators.
Marines > everything
GreEny K
Profile Joined February 2008
Germany7312 Posts
July 19 2011 16:59 GMT
#8
Didn't know.

I tried to log in a few months ago and got a message along the lines of "The way you log in changed" and my password did not work. I went and changed it using security questions, and added in caps letters... Guess it didn't help lol.
Why would you ever choose failure, when success is an option.
Glowbox
Profile Joined June 2010
Netherlands330 Posts
July 19 2011 16:59 GMT
#9
Has been in Battle.net for years.

If you're really worried about your account you have an authenticator or authenticator app anyway.
PassiveAce
Profile Blog Joined February 2011
United States18076 Posts
Last Edited: 2011-07-19 17:02:00
July 19 2011 17:00 GMT
#10
huh, maybe it automatically detects cap's in a password and ignores cap detection if its all the same. testing now.
Edit- forgot server is down.
Call me Marge Simpson cuz I love you homie
Trowa127
Profile Joined January 2011
United Kingdom1230 Posts
July 19 2011 17:03 GMT
#11
On July 20 2011 01:59 vnlegend wrote:
Really poor programming by Blizzard. Who knows what other vulnerabilities exist within their system. Or maybe it was their plan all along to reveal a limited vulnerability to make money off of authenticators.


They don't make money on authenticators, they are sold at cost. And do you know how much Game Master time hacking takes up on WoW? It costs them a ridiculously large amount of money.

Stupid nonetheless.
Bling, MC, Snute, HwangSin, Deranging (<3) fan. 'Full name - ESP ORTS' Vote hotbid. Vote ESPORTS.
Hoon
Profile Joined December 2010
Brazil891 Posts
July 19 2011 17:03 GMT
#12
Oh wow I didn't know about it, but as far as I know, their system detects caps lock when you want to change passwords.
For example, you can't change it from ASDasd to ASDasd, but you can change it from ASDasd to asdASD.
SEn Fanclub: http://www.teamliquid.net/forum/viewmessage.php?topic_id=170834
ragnorr
Profile Joined April 2011
Denmark6097 Posts
July 19 2011 17:04 GMT
#13
On July 20 2011 02:00 PassiveAce wrote:
huh, maybe it automatically detects cap's in a password and ignores cap detection if its all the same. testing now.
Edit- forgot server is down.

It ignores it. But really, just make your password longer or get an authendicator if you are worried about security
busbarn
Profile Joined August 2010
Sweden984 Posts
July 19 2011 17:04 GMT
#14
Well, if someone gets your password say through a keylogger which is the most common. It doesn't really matter anyway. I have a hard time seeing how making it read upper and lower cases different makes a difference in security. It's still symbols. Maybe someone can explain it too me,
aksfjh
Profile Joined November 2010
United States4853 Posts
July 19 2011 17:07 GMT
#15
At first glance, this seems like a terrible thing. Why would they ignore caps?! But think about it. Most hackings are done by snooping and not brute force cracking. At this point in time, you're more in danger if you use the same password everywhere than if your password ignores case.
nitdkim
Profile Blog Joined March 2010
1264 Posts
July 19 2011 17:07 GMT
#16
wtf really... that's some major flaw there -_-
PM me if you want random korean images translated.
Carush
Profile Joined June 2011
United States356 Posts
July 19 2011 17:10 GMT
#17
the lesson here is

dont play WoW
lurked
Profile Blog Joined March 2010
Canada918 Posts
Last Edited: 2011-07-19 17:14:15
July 19 2011 17:10 GMT
#18
On July 20 2011 01:59 Qurid wrote:
You also can log into WoW by typing your entire password in capslock.


I LOVE TO SHOUT AT MY GAME, THEN IT'S SO SCARED THAT IT LOGS IN RIGHT AWAY!
(Get it? Because like, in caps you're shouting and.... yeah right.... I thought it was lame too...)

But yeah, I don't know if it's a recent change in sc2 or something, but I don't remember ever having to remove caps lock in order to log in sc2(but it's not like I'm using caps lock often either!)

and also :

On July 20 2011 01:59 Glowbox wrote:
Has been in Battle.net for years.

If you're really worried about your account you have an authenticator or authenticator app anyway.


Best 5$ investment of my gamer life.
Magic is "just" magic until I get my hands on the source code.
Sithril
Profile Joined April 2011
Slovakia169 Posts
July 19 2011 17:12 GMT
#19
On July 20 2011 01:58 Sky0 wrote:
um my passwords are case sensitive and I cant log in to wow or sc2 if they arent the exact l

*edit*

must be a recent change cause i swear it use to be case sensitive just logged into wow not capitalizing any letters.


Same here. Just tried both on EU SC2 site and also in-game, and it wasn't case-sensitive :-/
But I, too, can remmember that it didn't let me log into game becouse I forgot to upper-case some letters in my password.

Weird.
ApBuLLet
Profile Joined September 2010
United States604 Posts
July 19 2011 17:12 GMT
#20
I don't really think this is as big of a deal as people are making it out to be. People tend to panic a bit when they feel like they or their property is at risk, and rightfully so. However, the vast majority of the time people get their accounts stolen is due to some sort of keylogging malware, in which case the a case sensitive password system would not matter, because your hacker would know anyway. The only thing I can see it being good for is if somebody is trying to guess your password or something like that. Case sensitive passwords make that a million times harder I would imagine, as you'd have to guess the password and the patter of lowercase/uppercase.

So overall, yes I think it is bad and there is no reason not to have case sensitive passwords for that little bit of extra security, but in reality I don't really think it is that big of a deal. I'm not going to worry about it personally
ZerGuy
Profile Joined June 2008
Poland204 Posts
July 19 2011 17:12 GMT
#21
It's not a major flaw, it's harder to make it ignore the casing. Really. It's one command more. They do it on purpose.
Someday ill be pro
Lysergic
Profile Joined December 2010
United States355 Posts
July 19 2011 17:12 GMT
#22
I'm honestly not surprised, considering all the flaws bnet 2.0 has. There's just so many simple little things with easy fixes that most programmers would consider bad programming found in the user interface and functionality of bnet.
bakesale
Profile Blog Joined August 2008
United States187 Posts
July 19 2011 17:13 GMT
#23
On July 20 2011 02:04 busbarn wrote:
Well, if someone gets your password say through a keylogger which is the most common. It doesn't really matter anyway. I have a hard time seeing how making it read upper and lower cases different makes a difference in security. It's still symbols. Maybe someone can explain it too me,

It only makes a difference if someone is trying to crack your password by guessing (dictionary attack). Having case-sensitive passwords adds 26 more symbols, increasing the number of possible "words" to choose from when guessing. So, technically, it is harder to crack a password in a system that distinguishes upper and lower case.
Dulkan
Profile Joined July 2011
Germany24 Posts
July 19 2011 17:16 GMT
#24
have to agree that this really isn't a big deal. Nobody will try to brute force crack your password for a battle.net account. Virtually all "hacks" of blizz-accounts are done via a keylogger and in that case it doesn't matter whether your password is 12345 or a 50-character monstrosity of lower case, upper case, numbers and special characters.
Carush
Profile Joined June 2011
United States356 Posts
Last Edited: 2011-07-19 17:20:28
July 19 2011 17:20 GMT
#25
also, what's with all the bnet hate threads this week

whether it's indirect or direct i feel like I've seen WAY to many of these last few days
Badfatpanda
Profile Blog Joined December 2010
United States9719 Posts
July 19 2011 17:21 GMT
#26
On July 20 2011 02:20 Carush wrote:
also, what's with all the bnet hate threads this week

whether it's indirect or direct i feel like I've seen WAY to many of these last few days


Where did I say I hated bnet? I don't even think this is that big of a deal but I thought people should know...go to one of the "this is why bnet sucks, this is how I could do it better" threads and post there.
Music is a higher revelation than all wisdom and philosophy. -Beethoven | Mech isn't a build, it's a way of life. -MajOr | Charlie.Sheen: "What is sarcastic, kids who have no courage to fight?" | #TerranPride #yolo #swag -Naama after 2-0'ing MC at HSC VI
TheOnlyOne
Profile Joined August 2010
Germany155 Posts
July 19 2011 17:25 GMT
#27
On July 20 2011 02:12 ApBuLLet wrote:
I don't really think this is as big of a deal as people are making it out to be. People tend to panic a bit when they feel like they or their property is at risk, and rightfully so. However, the vast majority of the time people get their accounts stolen is due to some sort of keylogging malware, in which case the a case sensitive password system would not matter, because your hacker would know anyway. The only thing I can see it being good for is if somebody is trying to guess your password or something like that. Case sensitive passwords make that a million times harder I would imagine, as you'd have to guess the password and the patter of lowercase/uppercase.

So overall, yes I think it is bad and there is no reason not to have case sensitive passwords for that little bit of extra security, but in reality I don't really think it is that big of a deal. I'm not going to worry about it personally


I think implementing a "feature" for case recognition is done super quick, its no work.

It is a good thing and "should" be in games anyway, so Blizzard should just do it and everyone is happy.


So no matter what, if the features is done so quick, just do it, nothing to lose.
aksfjh
Profile Joined November 2010
United States4853 Posts
July 19 2011 17:27 GMT
#28
On July 20 2011 02:21 Badfatpanda wrote:
Show nested quote +
On July 20 2011 02:20 Carush wrote:
also, what's with all the bnet hate threads this week

whether it's indirect or direct i feel like I've seen WAY to many of these last few days


Where did I say I hated bnet? I don't even think this is that big of a deal but I thought people should know...go to one of the "this is why bnet sucks, this is how I could do it better" threads and post there.


Post was possibly inspired by lysergic. Not sure why he decided to come in here to tell us how much he hates bnet. I found this bit of info out months ago, but I'm glad you posted about it.
Tofugrinder
Profile Joined September 2010
Austria899 Posts
July 19 2011 17:28 GMT
#29
On July 20 2011 02:12 ApBuLLet wrote:
I don't really think this is as big of a deal as people are making it out to be. People tend to panic a bit when they feel like they or their property is at risk, and rightfully so. However, the vast majority of the time people get their accounts stolen is due to some sort of keylogging malware, in which case the a case sensitive password system would not matter, because your hacker would know anyway. The only thing I can see it being good for is if somebody is trying to guess your password or something like that. Case sensitive passwords make that a million times harder I would imagine, as you'd have to guess the password and the patter of lowercase/uppercase.

So overall, yes I think it is bad and there is no reason not to have case sensitive passwords for that little bit of extra security, but in reality I don't really think it is that big of a deal. I'm not going to worry about it personally

caseinsensitive passwords and without numbers and signs are just as good as to have your password the same as the login. The password should be _always_ more than 10 characters with small/big letters, numbers and signs. So this is in my opinion a real big problem. For sc2 it might just be bad, but for wow this could end desastrous because people have their account data saved up
Otolia
Profile Blog Joined July 2011
France5805 Posts
July 19 2011 17:32 GMT
#30
My password is still too strong for anything remotely script-kiddy-ish. But no case sensitivity makes me think they have a partnership with Microsoft
windsupernova
Profile Joined October 2010
Mexico5280 Posts
July 19 2011 17:32 GMT
#31
On July 20 2011 02:12 ApBuLLet wrote:
I don't really think this is as big of a deal as people are making it out to be. People tend to panic a bit when they feel like they or their property is at risk, and rightfully so. However, the vast majority of the time people get their accounts stolen is due to some sort of keylogging malware, in which case the a case sensitive password system would not matter, because your hacker would know anyway. The only thing I can see it being good for is if somebody is trying to guess your password or something like that. Case sensitive passwords make that a million times harder I would imagine, as you'd have to guess the password and the patter of lowercase/uppercase.

So overall, yes I think it is bad and there is no reason not to have case sensitive passwords for that little bit of extra security, but in reality I don't really think it is that big of a deal. I'm not going to worry about it personally


Haha, not even that. Most of the time when they lose control of their accounts its because they fall for some social engineering scheme.

Still, I didn´t know about this.Ehhhhh, while it would be nice as long as you follow the rules for a secure password(not using common words,mixing up symbols, letter and numbers, etc) you should be fine.

Ehh anyways Blizzard should fix this to give their customers peace of mind, but this isn´t nearly as bad as it seems.
"Its easy, just trust your CPU".-Boxer on being good at games
Probe1
Profile Blog Joined August 2010
United States17920 Posts
July 19 2011 17:39 GMT
#32
Not a big deal. You can buy an authenticator or just add numbers.
우정호 KT_VIOLET 1988 - 2012 While we are postponing, life speeds by
Phayze
Profile Blog Joined June 2009
Canada2029 Posts
Last Edited: 2011-07-19 17:42:32
July 19 2011 17:41 GMT
#33
Ironically, most people who have their accounts hacked use the same password for forum boards and that is how hackers get their information. Hacking website databases is much easier than sifting through potentially millions of keystrokes through mass keylogging (and the bandwidth required!!), and it turns out most people use the same password for everything, or keep everything gaming related as one password etc. This is how you get caught, and having it ignore casing on full caps or full non caps passwords wont change a thing. Honestly it's good that blizzard implemented it, when I used to use a simpler password it was quite aggravating to mash the caps lock key a few times until it lets me log in.
Proud member of the LGA-1366 Core-i7 4Ghz Club
Bobbias
Profile Blog Joined March 2008
Canada1373 Posts
July 19 2011 18:04 GMT
#34
Brute force isn't the only way to break passwords... Cryptoanalasys is a far larger threat, all things considered. It's bad practice to ignore case, but the real question is how blizz stores the passwords,a and which algorithms they use.

Of course, using the same password as somewhere else is FAR worse than either of these risks. Anyone who's been following the LulzSec hacks should be aware of this...
Vipsanius
Profile Joined February 2011
Netherlands708 Posts
July 19 2011 18:08 GMT
#35
Basically what this means is that the hashing algorithm ignores capitals. Shouldn't be that big of a deal, considering blizzard is doing a lot for people that got their accounts hacked. Still, it's a flaw in security that should not have been there in the first place.
Blasterion
Profile Blog Joined October 2010
China10272 Posts
July 19 2011 18:12 GMT
#36
o.0" Really?

/downloads Authendicator
[TLNY]Mahjong Club Thread
Glowbox
Profile Joined June 2010
Netherlands330 Posts
Last Edited: 2011-07-19 18:14:24
July 19 2011 18:14 GMT
#37
On July 20 2011 03:04 Bobbias wrote:
Brute force isn't the only way to break passwords... Cryptoanalasys is a far larger threat, all things considered. It's bad practice to ignore case, but the real question is how blizz stores the passwords,a and which algorithms they use.


As far as I know Blizzard uses the SRP6 protocol ( http://en.wikipedia.org/wiki/Secure_remote_password_protocol ) for the login.
MyNameIsAlex
Profile Joined March 2011
Greece827 Posts
July 19 2011 18:18 GMT
#38
WHAT?

I cant believe it... Blizz so stupid once again...
Akill_
Profile Joined November 2008
United Kingdom80 Posts
July 19 2011 18:19 GMT
#39
Looks like blizzard decided this design decision would inevitably increase their authenticator sales.

+ Show Spoiler +
joke: they probably have hackers on payroll helping convince authenticator sales too, haha
ballasdontcry
Profile Joined January 2011
Canada595 Posts
July 19 2011 18:23 GMT
#40
If you have a smartphone, the authenticator apps are free for all 3 major platforms (iOS, android and BB). no reason not to get it if you have a smartphone
mewbert
Profile Joined April 2011
United States291 Posts
July 19 2011 18:24 GMT
#41
I guess I shouldn't be surprised at how stupid people are anymore. Are you really blaming battle net 2.0? its been like this with blizzard for at least 5 years. Do you actually rely on alternate caps being the crutch that keeps your account safe? LOL its just amazing how people think because passwords are not case sensitive they are all of the sudden super vulnerable to getting hacked or something, what kind of fucking logic do you people hating on battle net and saying that your account is at risk now use?
Kralic
Profile Blog Joined March 2010
Canada2628 Posts
July 19 2011 18:27 GMT
#42
It is not really a big deal. Their login server is pretty secure. If you have a keylogger on your computer it doesn't matter how many alternative capital letters and numbers you have in your password anyway.
Brood War forever!
Blasterion
Profile Blog Joined October 2010
China10272 Posts
July 19 2011 18:29 GMT
#43
On July 20 2011 03:19 Akill_ wrote:
Looks like blizzard decided this design decision would inevitably increase their authenticator sales.

+ Show Spoiler +
joke: they probably have hackers on payroll helping convince authenticator sales too, haha

But it's free....
[TLNY]Mahjong Club Thread
Jtn
Profile Blog Joined October 2010
444 Posts
July 19 2011 18:30 GMT
#44
Oh give me a break guys, go get an authenticator for your iPhone if you're scared of people hacking into your Starcraft account -_-
Billmaan
Profile Joined July 2011
7 Posts
July 19 2011 18:32 GMT
#45
On July 20 2011 02:12 ZerGuy wrote:
It's not a major flaw, it's harder to make it ignore the casing. Really. It's one command more. They do it on purpose.

This is the truth. This is not a case of "Blizzard was lazy" or "Blizzard forgot" or even "it's a bug": this must have been a conscious design decision.
simansh
Profile Blog Joined June 2011
257 Posts
July 19 2011 18:32 GMT
#46
What this means, is that it's 26 times more likely someone will get your password by guessing randomly. Which sounds big, but really, it isn't that much of a deal. If they knew your password already, case sensitive or not they will find it anyway.

Really the thing that makes your password the hardest to guess is how long it is, the amount of characters is already pretty large.
#1 Zenex Line fan!
KillerPlague
Profile Joined June 2010
United States1386 Posts
July 19 2011 18:35 GMT
#47
it doesn't change much, but i would have prefered the added security. still gonna keep playing as normal though
Side 1: Why no dominant players with 90% win ratio Side 2: Nerf Side 1
DuckS
Profile Joined September 2010
United States845 Posts
July 19 2011 18:37 GMT
#48
I don't understand this blizzard hate train. Your password isn't case sensitive... boohoo. It's not like you're suddenly vulnerable to hackers. I read the OP and sort of laughed, because this didn't even cross me as people thinking this would be a big deal. Man, was I wrong. Most of the time when you're hacked it's you being stupid and unsafe downloading malware or using some stupid social site, not because blizz's password requirements aren't case sensitive.
"You foiled us this time Americans, but your liberty will not protect your Marilyn Monroe forever - our Queen must FEED!" - Deleuze
Nagano
Profile Blog Joined July 2010
United States1157 Posts
July 19 2011 18:39 GMT
#49
Interesting note: BW bnet1.0 was case-sensitive.
“The illiterate of the 21st century will not be those who cannot read and write, but those who cannot learn, unlearn, and relearn.”
Gheed
Profile Blog Joined September 2010
United States972 Posts
July 19 2011 18:40 GMT
#50
Authenticators are free, and I sincerely doubt anyone is going to try to bruteforce your account anyway. Adding case sensitivity to passwords wouldn't do anything.
Gheed
Profile Blog Joined September 2010
United States972 Posts
July 19 2011 18:42 GMT
#51
On July 20 2011 03:39 Nagano wrote:
Interesting note: BW bnet1.0 was case-sensitive.


No, original battle.net passwords are not case sensitive, either. I just tested it using Warcraft 3.
Ramuh
Profile Joined February 2011
Germany238 Posts
July 19 2011 18:42 GMT
#52
It doesn't matter. You almost can't bruteforce passwords over network, it just does too damn long. while capitalization doubles the number of possible passwords (well not exactly, but you get the point) bruteforcing it is not an option.

I guarantee you that 99,9 % of so called "hacked" accounts are from keyloggers, phishing sites, trojans and such stuff

http://imgur.com/gallery/YWFLq substitute viruses with hacks and you're about right

Quick Math:
26 chars, 6 char password length, and assuming you can try 100 passwords per second you

26^6 / 100 / 60 / 60 / 24 = 35 days for bruteforcing a 6(!) char password. And thats assuming blizzard lets you bombard their servers.
Bobbias
Profile Blog Joined March 2008
Canada1373 Posts
July 19 2011 18:43 GMT
#53
On July 20 2011 03:14 Glowbox wrote:
Show nested quote +
On July 20 2011 03:04 Bobbias wrote:
Brute force isn't the only way to break passwords... Cryptoanalasys is a far larger threat, all things considered. It's bad practice to ignore case, but the real question is how blizz stores the passwords,a and which algorithms they use.


As far as I know Blizzard uses the SRP6 protocol ( http://en.wikipedia.org/wiki/Secure_remote_password_protocol ) for the login.


Thanks for the link, never knew about that (I'm no crypto nerd, but I'm not clueless either).

At first glance it looks like a pretty secure system, but like I said at first glance.
TheResidentEvil
Profile Joined September 2010
United States991 Posts
July 19 2011 18:46 GMT
#54
definitely a big deal. You pay for your account so it should be able to detect case. This is dumb oversight anyway. everything detects case so no reason not to
Mithriel
Profile Joined November 2010
Netherlands2969 Posts
July 19 2011 18:49 GMT
#55
rofl, here i was thinking my password actually had capitals in them. Made me get an authenticator (was on my todo list for ages, just to lazy).

Never had one before, and irony is i hardly play WoW anymore which authenticator is most needed for and gave away most of my gold already but ah well.
There is no shame in defeat so long as the spirit is unconquered. | Cheering for Maru, Innovation and MMA!
Triscuit
Profile Blog Joined April 2010
United States722 Posts
July 19 2011 18:51 GMT
#56
On July 20 2011 03:42 Ramuh wrote:
It doesn't matter. You almost can't bruteforce passwords over network, it just does too damn long. while capitalization doubles the number of possible passwords (well not exactly, but you get the point) bruteforcing it is not an option.

I guarantee you that 99,9 % of so called "hacked" accounts are from keyloggers, phishing sites, trojans and such stuff

http://imgur.com/gallery/YWFLq substitute viruses with hacks and you're about right

Quick Math:
26 chars, 6 char password length, and assuming you can try 100 passwords per second you

26^6 / 100 / 60 / 60 / 24 = 35 days for bruteforcing a 6(!) char password. And thats assuming blizzard lets you bombard their servers.


This guy has the right idea.

Just make your password a few letters longer if you're really concerned. That will have a MUCH larger impact on the security of your password from bruteforcing.

However, it makes zero difference if you're getting keylogged.
FireFish
Profile Joined June 2011
Denmark228 Posts
July 19 2011 18:52 GMT
#57
i knew this, it sucks hard
Exempt.
Profile Joined May 2011
United States470 Posts
July 19 2011 18:57 GMT
#58
I just thought about this for a moment and came to conclusion that (like always) people are just making assumptions that case sensitive would be a worthy benefit.

So let's go ahead and look at it, blizzard passwords already use letters, numbers, and symbols. This is already a ton of possibilities and whether there's case sensitive to add another 26 possibilities or not probably doesn't matter enough to have case sensitive because either way the searches are somewhat long.

Next reason would be that hacking is often resulting from a keylogger not some hacker searching all the possible combinations of your passwords when they have your username.

Another reason why this isn't applicable is that hackers don't have a reason to spend time to search your password on Starcraft 2 whether there is case sensitive or not.

This last reason ties in with all the above reasons to make them more sensible and realistic: Having case sensitive is simply less user friendly thus not having it is much more convenient for starcraft users.

Thus blizzard probably doesn't see the point in having case sensitive. Instead of trashing blizzard who happen to be one of the best gaming companies out there and making assumptions on what you believe is right you should probably just weigh the facts as this topic isn't really important.
schmeebs
Profile Joined August 2010
United States115 Posts
July 19 2011 18:58 GMT
#59
unless you use a password that is not a word and is a jumble of letters/numbers/symbols it being case sensitive or not doesn't really matter, as people have said. If you get your account hacked 99.9% of the time its because you screwed up, not because some hacker has it in for you.
dcemuser
Profile Joined August 2010
United States3248 Posts
Last Edited: 2011-07-19 19:04:10
July 19 2011 19:01 GMT
#60
On July 20 2011 02:28 Tofugrinder wrote:
Show nested quote +
On July 20 2011 02:12 ApBuLLet wrote:
I don't really think this is as big of a deal as people are making it out to be. People tend to panic a bit when they feel like they or their property is at risk, and rightfully so. However, the vast majority of the time people get their accounts stolen is due to some sort of keylogging malware, in which case the a case sensitive password system would not matter, because your hacker would know anyway. The only thing I can see it being good for is if somebody is trying to guess your password or something like that. Case sensitive passwords make that a million times harder I would imagine, as you'd have to guess the password and the patter of lowercase/uppercase.

So overall, yes I think it is bad and there is no reason not to have case sensitive passwords for that little bit of extra security, but in reality I don't really think it is that big of a deal. I'm not going to worry about it personally

caseinsensitive passwords and without numbers and signs are just as good as to have your password the same as the login. The password should be _always_ more than 10 characters with small/big letters, numbers and signs. So this is in my opinion a real big problem. For sc2 it might just be bad, but for wow this could end desastrous because people have their account data saved up


I'm fairly certain WoW blocks brute force (and dictionary-based) attempts. If somebody is pounding out even a hundred thousand passwords a second, they're going to deactivate the account.

And at 500,000 a second, it would take your entire life to crack a 10 character password through brute force (using all lowercase). Dictionary based attempts are faster, but we're still talking about like a year at least.

On July 20 2011 03:58 schmeebs wrote:
unless you use a password that is not a word and is a jumble of letters/numbers/symbols it being case sensitive or not doesn't really matter, as people have said. If you get your account hacked 99.9% of the time its because you screwed up, not because some hacker has it in for you.


I would extend that 99.9% to 99.999% honestly. Basically, only people like Totalbiscuit, Reckful, Swifty, and other very notable WoW players would be in danger of these types of attacks.

(And even then, it would be easier to specifically target them in other ways)
tok
Profile Joined April 2010
United States691 Posts
July 19 2011 19:04 GMT
#61
Key logging has been apparent in almost all Blizzard games. World of Warcraft seems to be hit the most because of key logging programs hidden in addons that are common in the game. I think blizzard should indeed make passwords case sensitive in addition to adding a log in on screen keyboard that is randomly generated each click, a little excessive I know but security is important.
RaLakedaimon
Profile Joined August 2010
United States1564 Posts
July 19 2011 19:04 GMT
#62
I noticed this after release but thought maybe it was widely known and yeah it certainly is a stupid way to run things given all the people in WoW getting there account hijacked, just another glimpse at how Blizzard likes to do things I suppose. I guess you just gotta be smart about making the most long ass strange password you can that nobody would ever think of, but that's assuming there not stealing it through more standard means in which case I think your screwed either way.
Nagano
Profile Blog Joined July 2010
United States1157 Posts
July 19 2011 19:06 GMT
#63
On July 20 2011 03:42 Gheed wrote:
Show nested quote +
On July 20 2011 03:39 Nagano wrote:
Interesting note: BW bnet1.0 was case-sensitive.


No, original battle.net passwords are not case sensitive, either. I just tested it using Warcraft 3.


Hum, yea you're right, I just tested it on BW bnet. I guess back in the day it was case-sensitive, because I had a case-sensitive password that I could never remember the exact capitalization of, and always took me like 5 minutes to log in.
“The illiterate of the 21st century will not be those who cannot read and write, but those who cannot learn, unlearn, and relearn.”
zhurai
Profile Blog Joined September 2010
United States5660 Posts
July 19 2011 19:07 GMT
#64
wow. blizzard, do you have any idea what security is ~_~
Twitter: @zhurai | Site: http://zhurai.com
windsupernova
Profile Joined October 2010
Mexico5280 Posts
July 19 2011 19:08 GMT
#65
I can´t believe how big of a deal many people are making out of this.

This is not a huge deal, if you are worried about your password safety:

1.- Use long passwords, not common words and combine numbers and Symbols.
2.-Don´t use the same password for everything.
3.- Don´t fall for social engineering scams}
4.-Don´t download shady software.


All of above is much more important than, caps sensitive passwords. Gosh, I can´t believe how many people just want to get angry for the sake of getting angry(not directed at the OP he had good intentions in informing us but it really its not a big deal).


"Its easy, just trust your CPU".-Boxer on being good at games
Dental Floss
Profile Joined September 2009
United States1015 Posts
July 19 2011 19:09 GMT
#66
You guys are all missing the point. The problem comes when someone executes a mysql injection attack or gets access to the database that stores user data. A hacker can then use a GPU-based attack to guess and check against the hash values stored in the database without going over the network. They then have access to your email address and password. If its a common password they can basically steal your identity.
Kim Tae Gyun.... never forget Perfectman RIP
Skaff
Profile Joined February 2010
United States240 Posts
July 19 2011 19:12 GMT
#67
Still an odd line of defense to just neglect.. However most comments about brute force attacks are correct. They would take forever and bnet will already cut you out after so many failed attempts.

The authenticator is a great tool but it does have some issues. I personally used the physical key chain authenticator for a period of time (I did not have a smart phone yet). However, it become more of a pain over time. It eventually lost sync with bnet and it was generally 30 - 60 seconds ahead of bnet. (would have to start login, wait 30 - 60 seconds between putting in key and logging in) Though, the mobile version has other sync features the physical device does not.
Ramuh
Profile Joined February 2011
Germany238 Posts
July 19 2011 19:13 GMT
#68
On July 20 2011 04:09 Dental Floss wrote:
You guys are all missing the point. The problem comes when someone executes a mysql injection attack or gets access to the database that stores user data. A hacker can then use a GPU-based attack to guess and check against the hash values stored in the database without going over the network. They then have access to your email address and password. If its a common password they can basically steal your identity.


if something like this would happend to blizzard they would close down servers in the blink of an eye and make sure everyone would need too change their pw with whatever method.

Plus im almost certain their passwords are salted and stuff, making their passwords more secure
Torte de Lini
Profile Blog Joined September 2010
Germany38463 Posts
July 19 2011 19:13 GMT
#69
On July 20 2011 04:08 windsupernova wrote:
I can´t believe how big of a deal many people are making out of this.

This is not a huge deal, if you are worried about your password safety:

1.- Use long passwords, not common words and combine numbers and Symbols.
2.-Don´t use the same password for everything.
3.- Don´t fall for social engineering scams}
4.-Don´t download shady software.


All of above is much more important than, caps sensitive passwords. Gosh, I can´t believe how many people just want to get angry for the sake of getting angry(not directed at the OP he had good intentions in informing us but it really its not a big deal).




Point being that their extensive form of protection is completely overlooked.
https://twitter.com/#!/TorteDeLini (@TorteDeLini)
TelecoM
Profile Blog Joined January 2010
United States10679 Posts
July 19 2011 19:14 GMT
#70
It must of been a recent change because My pw has always been case sensitive and if I didn't type it in exactly , it wouldn't work
AKA: TelecoM[WHITE] Protoss fighting
zhurai
Profile Blog Joined September 2010
United States5660 Posts
July 19 2011 19:16 GMT
#71
you know, the other thing that pissed me off, is that I couldn't actually like... use punctuation in the passwords either. which increases security by _a lot_ (like period, commas, etc) = =
Twitter: @zhurai | Site: http://zhurai.com
Antylamon
Profile Joined March 2011
United States1981 Posts
Last Edited: 2011-07-19 19:20:26
July 19 2011 19:17 GMT
#72
On July 20 2011 03:42 Ramuh wrote:
It doesn't matter. You almost can't bruteforce passwords over network, it just does too damn long. while capitalization doubles the number of possible passwords (well not exactly, but you get the point) bruteforcing it is not an option.

I guarantee you that 99,9 % of so called "hacked" accounts are from keyloggers, phishing sites, trojans and such stuff

http://imgur.com/gallery/YWFLq substitute viruses with hacks and you're about right

Quick Math:
26 chars, 6 char password length, and assuming you can try 100 passwords per second you

26^6 / 100 / 60 / 60 / 24 = 35 days for bruteforcing a 6(!) char password. And thats assuming blizzard lets you bombard their servers.

You forgot numbers

6 char password would be 36 possible chars, so 251 days. GG hackers, mine would take more than your lifetime.

EDIT: 10 char password would take 1,159,360 years.
Dental Floss
Profile Joined September 2009
United States1015 Posts
July 19 2011 19:21 GMT
#73
On July 20 2011 04:13 Ramuh wrote:
Show nested quote +
On July 20 2011 04:09 Dental Floss wrote:
You guys are all missing the point. The problem comes when someone executes a mysql injection attack or gets access to the database that stores user data. A hacker can then use a GPU-based attack to guess and check against the hash values stored in the database without going over the network. They then have access to your email address and password. If its a common password they can basically steal your identity.


if something like this would happend to blizzard they would close down servers in the blink of an eye and make sure everyone would need too change their pw with whatever method.

Plus im almost certain their passwords are salted and stuff, making their passwords more secure


Thats not how it works. Such attacks are common-place against banks and major corporations. You get no warning, and once you find out its too late. Modern GPUs can crack passwords hundreds if not thousands of times faster than CPUs. See bitcoin mining for more information about parallel hash-checking.
Kim Tae Gyun.... never forget Perfectman RIP
Kralic
Profile Blog Joined March 2010
Canada2628 Posts
July 19 2011 19:21 GMT
#74
Here is the Blizzard employee's posts explaining the reasoning behind it.

http://us.battle.net/wow/en/forum/topic/1869566296#2
http://us.battle.net/wow/en/forum/topic/1658712043?page=2#21

It is not a big deal. I said this before and I stand beside it.
Brood War forever!
celious
Profile Joined September 2009
United States195 Posts
July 19 2011 19:22 GMT
#75
On July 20 2011 04:04 tok wrote:
Key logging has been apparent in almost all Blizzard games. World of Warcraft seems to be hit the most because of key logging programs hidden in addons that are common in the game. I think blizzard should indeed make passwords case sensitive in addition to adding a log in on screen keyboard that is randomly generated each click, a little excessive I know but security is important.



Lol you cannot hide keyloggers in addons because LUA cannot execute another process.


back to topic having case sensitive passwords increases difficulty of brute forcing a password which in all honesty is difficult to do these days because accounts are locked after so many attempts like 10 I think? And it doesn't matter if they use proxies or not the account still becomes locked.

Just avoid simple easy to guess passwords and don't reuse passwords and you'll be fine
Dental Floss
Profile Joined September 2009
United States1015 Posts
Last Edited: 2011-07-19 19:26:30
July 19 2011 19:23 GMT
#76
On July 20 2011 04:17 noobinator wrote:
Show nested quote +
On July 20 2011 03:42 Ramuh wrote:
It doesn't matter. You almost can't bruteforce passwords over network, it just does too damn long. while capitalization doubles the number of possible passwords (well not exactly, but you get the point) bruteforcing it is not an option.

I guarantee you that 99,9 % of so called "hacked" accounts are from keyloggers, phishing sites, trojans and such stuff

http://imgur.com/gallery/YWFLq substitute viruses with hacks and you're about right

Quick Math:
26 chars, 6 char password length, and assuming you can try 100 passwords per second you

26^6 / 100 / 60 / 60 / 24 = 35 days for bruteforcing a 6(!) char password. And thats assuming blizzard lets you bombard their servers.

You forgot numbers

6 char password would be 36 possible chars, so 251 days. GG hackers, mine would take more than your lifetime.

EDIT: 10 char password would take 1,159,360 years.


Yes...251 days with that hypothetical rate. However, modern computers can calculate 2,000,000,000 hashes PER SECOND. Your 6 char password would then take 1.5 seconds to break.
Kim Tae Gyun.... never forget Perfectman RIP
Bobbias
Profile Blog Joined March 2008
Canada1373 Posts
July 19 2011 19:25 GMT
#77
On July 20 2011 04:09 Dental Floss wrote:
You guys are all missing the point. The problem comes when someone executes a mysql injection attack or gets access to the database that stores user data. A hacker can then use a GPU-based attack to guess and check against the hash values stored in the database without going over the network. They then have access to your email address and password. If its a common password they can basically steal your identity.


Someone with some sense. Yes, if someone were to gain access to the SQL databases with the hashed keys, they could use an attack to break the keys and get your password... Problem with thinking that 26 extra keys would help here is that they aren't actually looking for your password, they are looking for whatever password will give you that key, because there are collisions in the hash function.

Adding 26 extra keys wouldn't do too much, but would probably slow things down. Unfortunately, if they have access to the hashed passwords, and happen to have a rainbow table, things are looking pretty grim for a lot of people. This is part of why the LulzSec hacks were so bad. Not to mention that if they happen to get your password for something else (due to shoddy security practice), if you happen to use the same, or a similar password, you re in trouble, regardless of how blizz stores your password.

I urge everyone here to read up about how LulzSec managed to get their information. They exposed thousands of username and password combinations, they broke into tons of different systems, many of which were supposed to be secure.
celious
Profile Joined September 2009
United States195 Posts
July 19 2011 19:29 GMT
#78
On July 20 2011 04:25 Bobbias wrote:
Show nested quote +
On July 20 2011 04:09 Dental Floss wrote:
You guys are all missing the point. The problem comes when someone executes a mysql injection attack or gets access to the database that stores user data. A hacker can then use a GPU-based attack to guess and check against the hash values stored in the database without going over the network. They then have access to your email address and password. If its a common password they can basically steal your identity.


Someone with some sense. Yes, if someone were to gain access to the SQL databases with the hashed keys, they could use an attack to break the keys and get your password... Problem with thinking that 26 extra keys would help here is that they aren't actually looking for your password, they are looking for whatever password will give you that key, because there are collisions in the hash function.

Adding 26 extra keys wouldn't do too much, but would probably slow things down. Unfortunately, if they have access to the hashed passwords, and happen to have a rainbow table, things are looking pretty grim for a lot of people. This is part of why the LulzSec hacks were so bad. Not to mention that if they happen to get your password for something else (due to shoddy security practice), if you happen to use the same, or a similar password, you re in trouble, regardless of how blizz stores your password.

I urge everyone here to read up about how LulzSec managed to get their information. They exposed thousands of username and password combinations, they broke into tons of different systems, many of which were supposed to be secure.



LulzSec preformed many simple hacks against systems that weren't secure. Technically you could say everything is supposed to be secure but it obviously isn't. Also the databases that LulzSec released were of random gaming sites or low budget game developers that obviously dont have the means or resources to secure and monitor their system like companies such as Blizzard. If you've ever seen the behind the scenes WoW systems you would be amazed.
Dental Floss
Profile Joined September 2009
United States1015 Posts
Last Edited: 2011-07-19 19:32:51
July 19 2011 19:32 GMT
#79
On July 20 2011 04:29 celious wrote:
Show nested quote +
On July 20 2011 04:25 Bobbias wrote:
On July 20 2011 04:09 Dental Floss wrote:
You guys are all missing the point. The problem comes when someone executes a mysql injection attack or gets access to the database that stores user data. A hacker can then use a GPU-based attack to guess and check against the hash values stored in the database without going over the network. They then have access to your email address and password. If its a common password they can basically steal your identity.


Someone with some sense. Yes, if someone were to gain access to the SQL databases with the hashed keys, they could use an attack to break the keys and get your password... Problem with thinking that 26 extra keys would help here is that they aren't actually looking for your password, they are looking for whatever password will give you that key, because there are collisions in the hash function.

Adding 26 extra keys wouldn't do too much, but would probably slow things down. Unfortunately, if they have access to the hashed passwords, and happen to have a rainbow table, things are looking pretty grim for a lot of people. This is part of why the LulzSec hacks were so bad. Not to mention that if they happen to get your password for something else (due to shoddy security practice), if you happen to use the same, or a similar password, you re in trouble, regardless of how blizz stores your password.

I urge everyone here to read up about how LulzSec managed to get their information. They exposed thousands of username and password combinations, they broke into tons of different systems, many of which were supposed to be secure.



LulzSec preformed many simple hacks against systems that weren't secure. Technically you could say everything is supposed to be secure but it obviously isn't. Also the databases that LulzSec released were of random gaming sites or low budget game developers that obviously dont have the means or resources to secure and monitor their system like companies such as Blizzard. If you've ever seen the behind the scenes WoW systems you would be amazed.


Low level targets like senate.gov or nintendo.com? navy.mil or citibank.com? Blizzard isn't some invincible titan. There is literally no reason to arbitrarily reduce the number of possible passwords.
Kim Tae Gyun.... never forget Perfectman RIP
Losiff
Profile Joined April 2011
8 Posts
July 19 2011 19:36 GMT
#80
A wild guess, they turned it off, because their customer service got flooded by messages from noob wow-players who had their caps lock on.

This doesnt really make it any less secure. Maybe if somebody has a password "pAsswORd", this would change it from almost guessable to guessable.
ShadowWolf
Profile Joined March 2010
United States197 Posts
July 19 2011 19:37 GMT
#81
On July 20 2011 04:23 Dental Floss wrote:
Show nested quote +
On July 20 2011 04:17 noobinator wrote:
On July 20 2011 03:42 Ramuh wrote:
It doesn't matter. You almost can't bruteforce passwords over network, it just does too damn long. while capitalization doubles the number of possible passwords (well not exactly, but you get the point) bruteforcing it is not an option.

I guarantee you that 99,9 % of so called "hacked" accounts are from keyloggers, phishing sites, trojans and such stuff

http://imgur.com/gallery/YWFLq substitute viruses with hacks and you're about right

Quick Math:
26 chars, 6 char password length, and assuming you can try 100 passwords per second you

26^6 / 100 / 60 / 60 / 24 = 35 days for bruteforcing a 6(!) char password. And thats assuming blizzard lets you bombard their servers.

You forgot numbers

6 char password would be 36 possible chars, so 251 days. GG hackers, mine would take more than your lifetime.

EDIT: 10 char password would take 1,159,360 years.


Yes...251 days with that hypothetical rate. However, modern computers can calculate 2,000,000,000 hashes PER SECOND. Your 6 char password would then take 1.5 seconds to break.


This is relevant if they have the hash through some type of sniffing - which is probably one technique used to gather passwords and hack accounts. However, the Blizzard system automatically locks you out if you try too many passwords too quickly, so you're time-limited. Obviously if you have already have the hash then the time to brute for it is inconsequential as long as you're using something for which they have a prebuilt hash.
DrBoo
Profile Joined April 2010
Canada1177 Posts
July 19 2011 19:38 GMT
#82
Seems like a brilliant plan... so they can sell more authenticators
"DrBoo is an elaborate troll" -Pufftrees
celious
Profile Joined September 2009
United States195 Posts
July 19 2011 19:41 GMT
#83

Low level targets like senate.gov or nintendo.com? navy.mil or citibank.com? Blizzard isn't some invincible titan. There is literally no reason to arbitrarily reduce the number of possible passwords.

Nintendo and Citibank hacks were not LulzSec. Citibank had a flaw in software that was audited by a 3rd party that contract obviously came to an end And the navy site well who knows what happened there all they did was release a screenshot of some garbage injected into their job listing page. Companies such as facebook, google, and blizzard have millions of users, high profile targets and none of which have been mined yet as far as we know and good luck to any hacker that attempts the feat.

Google has been attacked a few times but nothing incredibly serious.
DJFaqU
Profile Joined May 2011
466 Posts
July 19 2011 19:42 GMT
#84
On July 20 2011 04:23 Dental Floss wrote:
Show nested quote +
On July 20 2011 04:17 noobinator wrote:
On July 20 2011 03:42 Ramuh wrote:
It doesn't matter. You almost can't bruteforce passwords over network, it just does too damn long. while capitalization doubles the number of possible passwords (well not exactly, but you get the point) bruteforcing it is not an option.

I guarantee you that 99,9 % of so called "hacked" accounts are from keyloggers, phishing sites, trojans and such stuff

http://imgur.com/gallery/YWFLq substitute viruses with hacks and you're about right

Quick Math:
26 chars, 6 char password length, and assuming you can try 100 passwords per second you

26^6 / 100 / 60 / 60 / 24 = 35 days for bruteforcing a 6(!) char password. And thats assuming blizzard lets you bombard their servers.

You forgot numbers

6 char password would be 36 possible chars, so 251 days. GG hackers, mine would take more than your lifetime.

EDIT: 10 char password would take 1,159,360 years.


Yes...251 days with that hypothetical rate. However, modern computers can calculate 2,000,000,000 hashes PER SECOND. Your 6 char password would then take 1.5 seconds to break.


Also cloud time and time on botnets is cheap as FUCK.
Chill
Profile Blog Joined January 2005
Calgary25983 Posts
July 19 2011 19:42 GMT
#85
On July 20 2011 04:32 Dental Floss wrote:
Show nested quote +
On July 20 2011 04:29 celious wrote:
On July 20 2011 04:25 Bobbias wrote:
On July 20 2011 04:09 Dental Floss wrote:
You guys are all missing the point. The problem comes when someone executes a mysql injection attack or gets access to the database that stores user data. A hacker can then use a GPU-based attack to guess and check against the hash values stored in the database without going over the network. They then have access to your email address and password. If its a common password they can basically steal your identity.


Someone with some sense. Yes, if someone were to gain access to the SQL databases with the hashed keys, they could use an attack to break the keys and get your password... Problem with thinking that 26 extra keys would help here is that they aren't actually looking for your password, they are looking for whatever password will give you that key, because there are collisions in the hash function.

Adding 26 extra keys wouldn't do too much, but would probably slow things down. Unfortunately, if they have access to the hashed passwords, and happen to have a rainbow table, things are looking pretty grim for a lot of people. This is part of why the LulzSec hacks were so bad. Not to mention that if they happen to get your password for something else (due to shoddy security practice), if you happen to use the same, or a similar password, you re in trouble, regardless of how blizz stores your password.

I urge everyone here to read up about how LulzSec managed to get their information. They exposed thousands of username and password combinations, they broke into tons of different systems, many of which were supposed to be secure.



LulzSec preformed many simple hacks against systems that weren't secure. Technically you could say everything is supposed to be secure but it obviously isn't. Also the databases that LulzSec released were of random gaming sites or low budget game developers that obviously dont have the means or resources to secure and monitor their system like companies such as Blizzard. If you've ever seen the behind the scenes WoW systems you would be amazed.


Low level targets like senate.gov or nintendo.com? navy.mil or citibank.com? Blizzard isn't some invincible titan. There is literally no reason to arbitrarily reduce the number of possible passwords.

Okay, let's move on. Most people agree that there should be capitals in the passwords - No need to fearmonger like this.
Moderator
Antylamon
Profile Joined March 2011
United States1981 Posts
Last Edited: 2011-07-19 19:46:17
July 19 2011 19:45 GMT
#86
On July 20 2011 04:41 celious wrote:
Show nested quote +

Low level targets like senate.gov or nintendo.com? navy.mil or citibank.com? Blizzard isn't some invincible titan. There is literally no reason to arbitrarily reduce the number of possible passwords.

Nintendo and Citibank hacks were not LulzSec. Citibank had a flaw in software that was audited by a 3rd party that contract obviously came to an end And the navy site well who knows what happened there all they did was release a screenshot of some garbage injected into their job listing page. Companies such as facebook, google, and blizzard have millions of users, high profile targets and none of which have been mined yet as far as we know and good luck to any hacker that attempts the feat.

Google has been attacked a few times but nothing incredibly serious.

Does anyone else feel like this post is kind of suspicious 0.o

Anyways, the senate is a pretty big target, bigger than Nintendo or even the navy. You didn't explain that in your post
Sanitys
Profile Joined April 2010
Canada126 Posts
July 19 2011 19:46 GMT
#87
Had no idea, my battle.net PW has always contained(or so I thought) capitalization. Not a big deal though my PW is still long enough and complex enough that the only way someone is going to get in is via a keylogger, in which case the capitals are irrelevant.

I just find it interesting that a company of Blizzards stature doesn't have a simple, standard feature like case sensitive passwords.
schmeebs
Profile Joined August 2010
United States115 Posts
July 19 2011 19:47 GMT
#88
On July 20 2011 04:38 DrBoo wrote:
Seems like a brilliant plan... so they can sell more authenticators

Blizzard does not make money on authenticators, they are sold essentially at cost and if you have a smartphone of ANY variety they are free.
Ygz
Profile Joined June 2010
England370 Posts
July 19 2011 19:53 GMT
#89
Definitely odd to not allow it but as long you are mixing up your passwords with numbers, it needn't be a concern.
Everything Newton said.
Erionn
Profile Joined January 2011
United States1015 Posts
July 19 2011 19:55 GMT
#90
It DEFINITELY used to be case-sensitive, 100% positive. I did notice they changed it, not sure how long. It has to be recently because I remember having to log in to another Bnet account of mine with caps just a few months ago.
Glowbox
Profile Joined June 2010
Netherlands330 Posts
July 19 2011 20:20 GMT
#91
On July 20 2011 04:23 Dental Floss wrote:
Show nested quote +
On July 20 2011 04:17 noobinator wrote:
On July 20 2011 03:42 Ramuh wrote:
It doesn't matter. You almost can't bruteforce passwords over network, it just does too damn long. while capitalization doubles the number of possible passwords (well not exactly, but you get the point) bruteforcing it is not an option.

I guarantee you that 99,9 % of so called "hacked" accounts are from keyloggers, phishing sites, trojans and such stuff

http://imgur.com/gallery/YWFLq substitute viruses with hacks and you're about right

Quick Math:
26 chars, 6 char password length, and assuming you can try 100 passwords per second you

26^6 / 100 / 60 / 60 / 24 = 35 days for bruteforcing a 6(!) char password. And thats assuming blizzard lets you bombard their servers.

You forgot numbers

6 char password would be 36 possible chars, so 251 days. GG hackers, mine would take more than your lifetime.

EDIT: 10 char password would take 1,159,360 years.


Yes...251 days with that hypothetical rate. However, modern computers can calculate 2,000,000,000 hashes PER SECOND. Your 6 char password would then take 1.5 seconds to break.


And that's why you don't use MD5/SHA-family hash functions. Here's how you do it: http://codahale.com/how-to-safely-store-a-password/ Good luck bruteforcing that!
MVega
Profile Joined November 2010
763 Posts
July 19 2011 20:29 GMT
#92
I knew about that in WoW, but I always kind of assumed that they would have changed that for SC2. Guess not. :/ They really probably should do something about that but I'm not worried as my password is quite long and contains symbols.
bumkin: How can you play like 50 games per day... I 4gate 2 times then it's nap time
vlnplyr
Profile Joined November 2010
United States76 Posts
July 19 2011 21:18 GMT
#93
On July 20 2011 04:47 schmeebs wrote:
Show nested quote +
On July 20 2011 04:38 DrBoo wrote:
Seems like a brilliant plan... so they can sell more authenticators

Blizzard does not make money on authenticators, they are sold essentially at cost and if you have a smartphone of ANY variety they are free.


This is correct. There is an iPhone app, which I have, that I use. HIGHLY recommend it if you value your account in the least bit. I suppose if you were to lose your phone AND have your account hacked by the person that stole it... but then you're just having one hell of a bad day!
www.youtube.com/vlnplyr5
Pyre
Profile Joined July 2010
United States1940 Posts
Last Edited: 2011-07-19 21:29:55
July 19 2011 21:29 GMT
#94
I would say get an authenticator. It gives peice of mind. My only beef wih it is the authenticator can be hard to read. In low light Also it can be a real hassel if you lose or break it.
zyzski
Profile Joined May 2010
United States698 Posts
Last Edited: 2011-07-19 21:36:50
July 19 2011 21:34 GMT
#95
definitely used to be case sensitive, interesting

but for real, nobody is going to go around bruteforcing your blizzard account unless it's some super decked WoW character or famous SC2 account. just be careful about showing your bnet email addy.
TYBG
BrTarolg
Profile Blog Joined June 2009
United Kingdom3574 Posts
July 20 2011 18:45 GMT
#96
The fact it used to work, and no longer works, implies they are using an insecure form of storing your password, i.e one that is most likely plaintext

GJ BLIZZARD
Furycrab
Profile Joined April 2010
Canada456 Posts
July 20 2011 20:11 GMT
#97
If they have proper systems in place to prevent password brute forcing, alternating caps won't realistically protect you more than just using a password that is not in the most popular passwords list, which I can only assume you don't if you alternate caps in your passwords.

The line of reasoning here being: If they got your PW via a number of ways, case of the PW won't change a thing, so if case doesn't change a thing but has the potential of causing frustrations it shouldn't matter all that much. NOTE: This is NOT true if the PW is for a system that could be brute forced! (In which case this adds an exponential amount of extra possibilities to your PW)


If you are really worried about security, get an authenticator.
Too tired to come up with something witty.
Lorch
Profile Joined June 2011
Germany3684 Posts
July 20 2011 20:12 GMT
#98
I'm actually quiet shocked to read this, that's a terrible think and it's just poor by blizzard given how long wow has been around.
Aberu
Profile Blog Joined April 2010
United States968 Posts
July 20 2011 20:14 GMT
#99
Case sensitivity is not some integral aspect to internet security, if your password has a decent amount of numbers and a word that isn't predictable, along with having an authenticator, it should never get hacked, and if it still does, then YOU did something wrong.
srsly
windsupernova
Profile Joined October 2010
Mexico5280 Posts
July 20 2011 20:14 GMT
#100
On July 21 2011 03:45 BrTarolg wrote:
The fact it used to work, and no longer works, implies they are using an insecure form of storing your password, i.e one that is most likely plaintext

GJ BLIZZARD


Eh? I don´t see the logic behind this. They are insecure about your password security so.... they make it laxer?
"Its easy, just trust your CPU".-Boxer on being good at games
Aberu
Profile Blog Joined April 2010
United States968 Posts
July 20 2011 20:17 GMT
#101
On July 21 2011 05:14 windsupernova wrote:
Show nested quote +
On July 21 2011 03:45 BrTarolg wrote:
The fact it used to work, and no longer works, implies they are using an insecure form of storing your password, i.e one that is most likely plaintext

GJ BLIZZARD


Eh? I don´t see the logic behind this. They are insecure about your password security so.... they make it laxer?


If it's not case-sensitive that doesn't imply it's simple text, I have no idea how he drew this conclusion either.
srsly
Goldfish
Profile Blog Joined August 2010
2230 Posts
Last Edited: 2011-07-20 23:58:00
July 20 2011 23:55 GMT
#102
On July 20 2011 02:32 windsupernova wrote:
Show nested quote +
On July 20 2011 02:12 ApBuLLet wrote:
I don't really think this is as big of a deal as people are making it out to be. People tend to panic a bit when they feel like they or their property is at risk, and rightfully so. However, the vast majority of the time people get their accounts stolen is due to some sort of keylogging malware, in which case the a case sensitive password system would not matter, because your hacker would know anyway. The only thing I can see it being good for is if somebody is trying to guess your password or something like that. Case sensitive passwords make that a million times harder I would imagine, as you'd have to guess the password and the patter of lowercase/uppercase.

So overall, yes I think it is bad and there is no reason not to have case sensitive passwords for that little bit of extra security, but in reality I don't really think it is that big of a deal. I'm not going to worry about it personally


Haha, not even that. Most of the time when they lose control of their accounts its because they fall for some social engineering scheme.


Not totally true (I don't have the numbers though >.>. But just from what people have said). In FFXI (not sure about WoW), most accounts were lost by visiting well known FFXI sites like ffxiah, ffxi wiki (from wikia), somepage, atlus, or even your linkshell(clan/guild)'s site (yes drama happens, someone who has access to the site loads it up with all the malware they can find). Seeing as how the WoW Wiki used to be hosted on wikia, I wouldn't be surprised if the wiki hosted bad ads occasionally too.

Sometimes this even happened with noscript and adblock plus users too (noscript needs to be set to block all things including iframes and be set to block it on trusted sites too).

Main reason is most of those sites need revenue from ads and some bad ads slip by (also sometimes the site owner leaves or is lazy and site ends up being compromised without anyone fixing it and without users who checked it before knowing).

Finally authenticators aren't full proof either. Some malware redirect, replace, or infect playonlineviewer.exe (for example) to something else. It brings the usual (really spoofed) pop up screen, asks for the one time password and password.

User enters it, it doesn't work. They find out that their authenticator has been disabled and password changed (this can happen by using the one time password the user entered and entering it on the site with the password then disabling the authenticator which is possible with SE, not sure about Blizzard).

Yes so even two step authentication is not completely safe (but it is still much safer).


Anyway as for is cap locks safer? Yes. Now in cases where its stranger vs stranger, account hackings usually happen with the full password given (social engineering, keylogger, etc).

But not all account lost are due to that. Maybe it's a PC bang or public place (where some may be able to sneak and look at what you're typing), or someone you know IRL, etc.

Having caps lock would reduce the risk of passwords stolen in that case (even though it's already small since it's already hard, it'd make it harder at least).

Anyway I think someone should bring this up on the battle.net forums (the caps thing) so they can read it.
https://connect.microsoft.com/WindowsServerFeedback/feedback/details/741495/biggest-explorer-annoyance-automatic-sorting-windows-7-server-2008-r2-and-vista#details Allow Disable Auto Arrange in Windows 7+
UnitedKronos
Profile Blog Joined January 2011
139 Posts
July 21 2011 00:17 GMT
#103
What the heck blizzard, my password seems easy enough as it is.....
Oh hai. ¯\_(ツ)_/¯
Wr3k
Profile Blog Joined June 2009
Canada2533 Posts
July 21 2011 00:23 GMT
#104
They probably figure that it will result in less overall hassle for them since the number of people who are getting locked out of their bnet account will go through the roof if its case sensitive. If you have a good password its still going to take someone a ridiculously long time to brute force it even without case sensitivity (if its good they can't dictionary it).
Barbiero
Profile Blog Joined September 2010
Brazil5259 Posts
July 21 2011 00:23 GMT
#105
Well, the thing is...

a) if you really want a well protected password, you'd have to use upper case, down case, numbers and symbols.
b) efficient hacking methods won't really care about uppercase or not
c) If you REALLY want to protect your account, use an authenticator.


Either way, it isn't such a big deal.
♥ The world needs more hearts! ♥
blagoonga123
Profile Blog Joined July 2007
United States2068 Posts
July 21 2011 00:33 GMT
#106
On July 21 2011 09:17 UnitedKronos wrote:
What the heck blizzard, my password seems easy enough as it is.....

lol well that's not really blizzard's fault
FOOL! Pain is my friend! Now let me introduce you to it!
.Aar
Profile Joined September 2010
2177 Posts
July 21 2011 00:39 GMT
#107
Didn't realize how many conspiracy theorists we had on TL until I read this thread.

Blizzard making it easier for you to get hacked so people will get authenticators? lol
Blizzard loses a ton of time and money because of hacking, and their Game Masters are legendary for how efficiently they handle your case in the event of a compromised account (if you scoff at this, you have never played another online game).
Furthermore, if someone gets your password through keylogging, whether your letters were capped or not has near zero significance.

It's funny to see cryptoanalasys/bruteforcing brought up in this thread. Unless you're Destiny or BoxeR, you have no reason to worry about the safety of your account.

On July 21 2011 05:14 Aberu wrote:
Case sensitivity is not some integral aspect to internet security, if your password has a decent amount of numbers and a word that isn't predictable, along with having an authenticator, it should never get hacked, and if it still does, then YOU did something wrong.


On July 21 2011 05:14 Aberu wrote:
Case sensitivity is not some integral aspect to internet security, if your password has a decent amount of numbers and a word that isn't predictable, along with having an authenticator, it should never get hacked, and if it still does, then YOU did something wrong.


Quoted twice in case you skip over it the first time.
now run into the setting sun, and suffer, but don't mess up your hair.
Sadistx
Profile Blog Joined February 2009
Zimbabwe5568 Posts
July 21 2011 00:42 GMT
#108
At least they don't store our passwords in a text file. Right? RIIIIIIIGHT?
dar0za
Profile Joined November 2010
Canada74 Posts
July 21 2011 00:45 GMT
#109
who the hell cares? it's been ages since i took a data management/probability class so i won't bother trying to prove it, but i have a good feeling that removing 26 possible characters doesn't put a dent in the total permutations of passwords available for you to choose.
open your mind a little too much and your brain will fall out. | sansfromage #302
Phaded
Profile Joined August 2010
Australia579 Posts
July 21 2011 01:01 GMT
#110
capitalization is not a big deal when the majority of password leaks are due to
a) User visiting phishing website, and giving up the full password
b) User having a keylogger, and program logs the full password

The only time capitalization ever matters is
i) Blizzard has their user database leaked, making it quicker to brute force your weaker password
ii) Someone looks over your shoulder and guesses your password and can see that you don't press the shift key so they don't need to worry about that.

Thankfully i) has never happened, and if ii) happened then you deserve it for either typing too slow or having a guessable password
I am down but I am far from over
Normal
Please log in or register to reply.
Live Events Refresh
RotterdaM Event
17:00
Stream Rumble #4 PTR Edition
RotterdaM965
IndyStarCraft 260
Liquipedia
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
RotterdaM 965
IndyStarCraft 249
UpATreeSC 117
JuggernautJason68
StarCraft: Brood War
Rain 1877
Shuttle 462
Hyuk 280
Mini 183
Soulkey 178
Dewaltoss 105
Sexy 103
ggaemo 82
Hyun 57
JYJ20
[ Show more ]
Yoon 18
HiyA 12
Sacsri 11
sorry 8
Free 5
Dota 2
Gorgc5819
qojqva4174
Super Smash Bros
Mew2King33
Other Games
Grubby1848
FrodaN948
B2W.Neo479
C9.Mang0138
QueenE71
Trikslyr63
ArmadaUGS54
NeuroSwarm28
rGuardiaN10
rubinoeu6
Organizations
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 22 non-featured ]
StarCraft 2
• Hupsaiya 32
• Adnapsc2 7
• StrangeGG 1
• intothetv
• Kozan
• sooper7s
• Migwel
• LaughNgamezSOOP
• AfreecaTV YouTube
• IndyKCrew
StarCraft: Brood War
• 80smullet 25
• HerbMon 2
• STPLYoutube
• ZZZeroYoutube
• BSLYoutube
Dota 2
• masondota21088
• WagamamaTV332
• lizZardDota237
League of Legends
• Nemesis1996
• Jankos1691
Other Games
• imaqtpie1111
• Shiphtur200
Upcoming Events
Maestros of the Game
17h 7m
Serral vs herO
Clem vs Reynor
[BSL 2025] Weekly
23h 7m
[BSL 2025] Weekly
23h 7m
Replay Cast
1d 15h
BSL Team Wars
2 days
Afreeca Starleague
2 days
Soma vs BeSt
Wardi Open
2 days
OSC
3 days
Sparkling Tuna Cup
3 days
Afreeca Starleague
3 days
Bisu vs Larva
[ Show More ]
LiuLi Cup
4 days
OSC
4 days
The PondCast
5 days
Wardi Open
6 days
Liquipedia Results

Completed

2025 Chongqing Offline CUP
RSL Revival: Season 2
HCC Europe

Ongoing

BSL 20 Team Wars
KCM Race Survival 2025 Season 3
BSL 21 Points
ASL Season 20
CSL 2025 AUTUMN (S18)
Maestros of the Game
StarSeries Fall 2025
FISSURE Playground #2
BLAST Open Fall 2025
BLAST Open Fall Qual
Esports World Cup 2025
BLAST Bounty Fall 2025
BLAST Bounty Fall Qual
IEM Cologne 2025
FISSURE Playground #1

Upcoming

IPSL Winter 2025-26
SC4ALL: Brood War
BSL 21 Team A
BSL Season 21
RSL Revival: Season 3
Stellar Fest
SC4ALL: StarCraft II
WardiTV TLMC #15
EC S1
ESL Impact League Season 8
SL Budapest Major 2025
BLAST Rivals Fall 2025
IEM Chengdu 2025
PGL Masters Bucharest 2025
Thunderpick World Champ.
CS Asia Championships 2025
ESL Pro League S22
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.