Re: [HACKERS] Re: Hashing passwords (was Updated TODO list)

From: Mattias Kregert <matti(at)algonet(dot)se>
To: Gene Sokolov <hook(at)aktrad(dot)ru>
Cc: Louis Bertrand <louis(at)bertrandtech(dot)on(dot)ca>, Bruce Momjian <maillist(at)candle(dot)pha(dot)pa(dot)us>, pgsql-hackers(at)postgreSQL(dot)org
Subject: Re: [HACKERS] Re: Hashing passwords (was Updated TODO list)
Date: 1999-07-12 11:50:49
Message-ID: 3789D699.29CAF93B@algonet.se
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

Another nice thing with SRP is that it is a mutual authentication. A
third party cannot say "hey i'm the server, please connect to me. Sure,
your password is correct, start sending queries... INSERT? ok, sure,
INSERT 1 1782136. go on..." and steal a lot of data... the SRP client
always knows if it is talking to the real thing. No more third party
attacks...
http://srp.stanford.edu/srp/others.html

/* m */

Gene Sokolov wrote:
>
> I completely agree with Louis. It's not just the hacker: there is no need
> for sysadmin to know passwords as well. I believe the security scheme where
> sysadmin or anyone has to take action in order *not* to see passwords is
> flawed.
>
> I think the following solution would be satisfactory:
> Store SHA(password) XOR SHA(mastervalue [+] uid). In case it's difficult to
> alter the wire protocol, store password XOR SHA(mastervalue [+] uid). Either
> way no one can get useful info without knowing the master value. Even simple
> password XOR <mastervalue> would be helpful.
>
> Gene Sokolov.
>
> From: Louis Bertrand <louis(at)bertrandtech(dot)on(dot)ca>
> > Why should anyone be able to read cleartext passwords, or even need to?
> > People have a habit of reusing the same password for logins elsewhere.
> > Hash the password as it's entered and compare hashes. This way, even if
> > the password file (PostgreSQL's or the system's) is compromised, the
> > attacker gains no extra information.
> >
> > > > From: Bruce Momjian <maillist(at)candle(dot)pha(dot)pa(dot)us>
> > > Yes, I remember now. We keep them in clear, because we send random
> > > salt-encrypted versions over the wire. Only Postgresql can read this
> > > table.

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message The Hermit Hacker 1999-07-12 12:02:09 Re: [HACKERS] 6.5.1 release date
Previous Message Mattias Kregert 1999-07-12 11:33:03 Re: [HACKERS] Re: Hashing passwords (was Updated TODO list)