Re: So we're in agreement....

From: Vince Vielhaber <vev(at)michvhf(dot)com>
To: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
Cc: Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us>, Hannu Krosing <hannu(at)tm(dot)ee>, The Hermit Hacker <scrappy(at)hub(dot)org>, "Sverre H(dot) Huseby" <sverrehu(at)online(dot)no>, pgsql-hackers(at)postgresql(dot)org
Subject: Re: So we're in agreement....
Date: 2000-05-07 19:23:37
Message-ID: Pine.BSF.4.21.0005071520540.13987-100000@paprika.michvhf.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-general pgsql-hackers

On Sun, 7 May 2000, Tom Lane wrote:

> Vince Vielhaber <vev(at)michvhf(dot)com> writes:
> >>>> My intent was not to send the username, but let the server figure it
> >>>> out by the response.
> >>
> >> That would be a neat trick. How will you do it? MD5 is not reversible.
>
> > CLIENT: md5(salt_from_server + md5(username + md5(password)))
>
> > SERVER: md5(salt_from_server + md5(username + stored_password))
>
> > The server runs thru all available usernames using the above algorithm.
>
> No, that doesn't work unless stored passwords contain no random salt
> at all (you could use the username alone, but as I previously said
> that's no substitute for random salt, and of dubious value anyway).
> That'd be a distinct *loss* in security, not an improvement.
>
> To have salt in the stored passwords, the server must receive the
> username first so that it can look up the pg_shadow entry and find
> which stored salt to send to the client (along with the randomly
> generated per-transaction salt). You could cloak the username as
> I suggested before, but there have to be two messages.

You're right, it wouldn't work. It should've been like this:

CLIENT: md5(salt_from_server + md5(username + password)))

SERVER: md5(salt_from_server + stored_password)

The "salt_from_server" is your random salt. The fixed salt is the
username.

Vince.
--
==========================================================================
Vince Vielhaber -- KA8CSH email: vev(at)michvhf(dot)com http://www.pop4.net
128K ISDN from $22.00/mo - 56K Dialup from $16.00/mo at Pop4 Networking
Online Campground Directory http://www.camping-usa.com
Online Giftshop Superstore http://www.cloudninegifts.com
==========================================================================

In response to

Responses

Browse pgsql-general by date

  From Date Subject
Next Message Hannu Krosing 2000-05-07 19:29:39 Re: You're on SecurityFocus.com for the cleartext passwords.
Previous Message Tom Lane 2000-05-07 19:16:51 Re: So we're in agreement....

Browse pgsql-hackers by date

  From Date Subject
Next Message Hannu Krosing 2000-05-07 19:29:39 Re: You're on SecurityFocus.com for the cleartext passwords.
Previous Message Tom Lane 2000-05-07 19:16:51 Re: So we're in agreement....