Re: You're on SecurityFocus.com for the cleartext passwords.

Поиск
Список
Период
Сортировка
От Hannu Krosing
Тема Re: You're on SecurityFocus.com for the cleartext passwords.
Дата
Msg-id 39147435.AFF32F7C@tm.ee
обсуждение исходный текст
Ответ на Re: You're on SecurityFocus.com for the cleartext passwords.  (Bruce Momjian <pgman@candle.pha.pa.us>)
Список pgsql-hackers
Bruce Momjian wrote:
> 
> Now, I we want to move all the stuff to use MD5 rather than the standard
> unix password crypt,

AFAIK, MD5 is one of "the standard password crypt"'s ;)

> that is another option, though I am not sure what
> value it would have.

One advantage would be passwords with more than 8 characters that
matter.

IMO the salt part in the "old" crypt code is there only to make it 
harder for people to accidentally discover that other people have 
the same password with them, which could easily be avoided by 
including the username as kind of supersalt in the md5 string, 
so the value passed over wire (and stored in DB would be
MD5('<username>:<passwd>'). 
If we want to make password hijacking real hard, we could store 
the above but ask the client for 
MD5(<server-supplied-salt>+MD5(<username>+':'+<passwd>))
and compare that

-------------
Hannu


В списке pgsql-hackers по дате отправления:

Предыдущее
От: Bruce Momjian
Дата:
Сообщение: Re: You're on SecurityFocus.com for the cleartext passwords.
Следующее
От: "Robert B. Easter"
Дата:
Сообщение: Re: You're on SecurityFocus.com for the cleartext passwords.