From: | Vince Vielhaber <vev(at)michvhf(dot)com> |
---|---|
To: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> |
Cc: | Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us>, Hannu Krosing <hannu(at)tm(dot)ee>, The Hermit Hacker <scrappy(at)hub(dot)org>, "Sverre H(dot) Huseby" <sverrehu(at)online(dot)no>, pgsql-hackers(at)postgresql(dot)org |
Subject: | Re: So we're in agreement.... |
Date: | 2000-05-07 19:23:37 |
Message-ID: | Pine.BSF.4.21.0005071520540.13987-100000@paprika.michvhf.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-general pgsql-hackers |
On Sun, 7 May 2000, Tom Lane wrote:
> Vince Vielhaber <vev(at)michvhf(dot)com> writes:
> >>>> My intent was not to send the username, but let the server figure it
> >>>> out by the response.
> >>
> >> That would be a neat trick. How will you do it? MD5 is not reversible.
>
> > CLIENT: md5(salt_from_server + md5(username + md5(password)))
>
> > SERVER: md5(salt_from_server + md5(username + stored_password))
>
> > The server runs thru all available usernames using the above algorithm.
>
> No, that doesn't work unless stored passwords contain no random salt
> at all (you could use the username alone, but as I previously said
> that's no substitute for random salt, and of dubious value anyway).
> That'd be a distinct *loss* in security, not an improvement.
>
> To have salt in the stored passwords, the server must receive the
> username first so that it can look up the pg_shadow entry and find
> which stored salt to send to the client (along with the randomly
> generated per-transaction salt). You could cloak the username as
> I suggested before, but there have to be two messages.
You're right, it wouldn't work. It should've been like this:
CLIENT: md5(salt_from_server + md5(username + password)))
SERVER: md5(salt_from_server + stored_password)
The "salt_from_server" is your random salt. The fixed salt is the
username.
Vince.
--
==========================================================================
Vince Vielhaber -- KA8CSH email: vev(at)michvhf(dot)com http://www.pop4.net
128K ISDN from $22.00/mo - 56K Dialup from $16.00/mo at Pop4 Networking
Online Campground Directory http://www.camping-usa.com
Online Giftshop Superstore http://www.cloudninegifts.com
==========================================================================
From | Date | Subject | |
---|---|---|---|
Next Message | Hannu Krosing | 2000-05-07 19:29:39 | Re: You're on SecurityFocus.com for the cleartext passwords. |
Previous Message | Tom Lane | 2000-05-07 19:16:51 | Re: So we're in agreement.... |
From | Date | Subject | |
---|---|---|---|
Next Message | Hannu Krosing | 2000-05-07 19:29:39 | Re: You're on SecurityFocus.com for the cleartext passwords. |
Previous Message | Tom Lane | 2000-05-07 19:16:51 | Re: So we're in agreement.... |