From: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> |
---|---|
To: | Vince Vielhaber <vev(at)michvhf(dot)com> |
Cc: | Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us>, Hannu Krosing <hannu(at)tm(dot)ee>, The Hermit Hacker <scrappy(at)hub(dot)org>, "Sverre H(dot) Huseby" <sverrehu(at)online(dot)no>, pgsql-hackers(at)postgresql(dot)org |
Subject: | Re: So we're in agreement.... |
Date: | 2000-05-07 19:16:51 |
Message-ID: | 19002.957727011@sss.pgh.pa.us |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-general pgsql-hackers |
Vince Vielhaber <vev(at)michvhf(dot)com> writes:
>>>> My intent was not to send the username, but let the server figure it
>>>> out by the response.
>>
>> That would be a neat trick. How will you do it? MD5 is not reversible.
> CLIENT: md5(salt_from_server + md5(username + md5(password)))
> SERVER: md5(salt_from_server + md5(username + stored_password))
> The server runs thru all available usernames using the above algorithm.
No, that doesn't work unless stored passwords contain no random salt
at all (you could use the username alone, but as I previously said
that's no substitute for random salt, and of dubious value anyway).
That'd be a distinct *loss* in security, not an improvement.
To have salt in the stored passwords, the server must receive the
username first so that it can look up the pg_shadow entry and find
which stored salt to send to the client (along with the randomly
generated per-transaction salt). You could cloak the username as
I suggested before, but there have to be two messages.
regards, tom lane
From | Date | Subject | |
---|---|---|---|
Next Message | Vince Vielhaber | 2000-05-07 19:23:37 | Re: So we're in agreement.... |
Previous Message | Vince Vielhaber | 2000-05-07 18:45:44 | Re: So we're in agreement.... |
From | Date | Subject | |
---|---|---|---|
Next Message | Vince Vielhaber | 2000-05-07 19:23:37 | Re: So we're in agreement.... |
Previous Message | Vince Vielhaber | 2000-05-07 18:45:44 | Re: So we're in agreement.... |