Well, some of you may know it, some of you may not, but there's this one software company, rather big, started in germany, called "S A P". As on my daily basis I have to work with some of their tools (the one I use is pretty much THE industry standard in the field I'm working in - there're only very few not using it, but as to my knowledge that's most likely due to high license fees smaller new-in-the-club business struggle with to pay for) - and sure have my personalized login credentials for it. This week, my password overstayed its welcome in the "still valid" lobby and I got prompted for a change ...
Ok, I guess many here agree that keep changing passwords on a regular basis actually leads to easier passwords (that's actually proven by some studies) and to avoidable support tickets in the IT departments dealing with "I forgot my password"-tickets ... but ok ... someone the industry still doesn'T has changed on that topic - and maybe never will ... just imagine Capt.
Picard on one of his famous self-destruct sequences - and the computer actually replies: "Your authorization has become invalid - please reset a new one." ... *sigh*
Anyway - I'm getting off topic here.
So, it came to my mind: "Well, over the years I developed a rather good ruleset about secure passphrases that I can remember" and typed in a new one. No, I did not made the mistake to just change the 3 at the end into a 4 - but actually did set a different one. To my surprise it got rejected with some message I've not yet encountered: "Your new password has to be different in more than 3 digits." - well, WHAT? It's a rather different password hardly even matching 3 spots - let alone enough to be only different in 3 or less ones - what the ... ?
Just out of curiosity I did on purpose what one should avoid: re-use my password but only changed on digit in it: same message. Changed a second one, a third one, and finally, after just chaging four digits it got accepted.
I still was curious and fired up the change dialog again - and typed in a way different phrase - but made sure it actually did match up exact 3 digits and random spots - and I got the error again.
Conclusion: Yes, for what ever reason, SAP seem to store passwords in PLAIN. Otherwise it would be impossible to detect if a passphrases matches another one on a specific number of digits, even with simple hash algos like md5 or sha1. So, how does a fortune500 company get away with storing user passwords in plain text, no even using a random salt - let alone proper hashing functions - but still generate millions of net growth each year? With THAT knowledge for me it's just a matter of time the next big database leak appears on the net - maybe this time a SAP user database? Or even worse: customer records? I'm just shocked ...