Re: [HACKERS] Hashing passwords (was Updated TODO list)

From: Louis Bertrand <louis(at)bertrandtech(dot)on(dot)ca>
To: Gene Sokolov <hook(at)aktrad(dot)ru>
Cc: pgsql-hackers(at)postgreSQL(dot)org
Subject: Re: [HACKERS] Hashing passwords (was Updated TODO list)
Date: 1999-07-09 13:36:45
Message-ID: Pine.BSO.4.10.9907091313480.15560-100000@tronix.bertrandtech.on.ca
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

It would be nice if the password scheme you finally settle on can be
optionally replaced (compile-time) by the password hash available native
on the OS. In the case of OpenBSD, the Blowfish-based replacement for the
DES or MD5 based crypt(3) is better suited to resisting dictionary and
other offline attacks by fast processors.

This suggestion is useful in case the shadow password file is compromised.
It is independent of any challenge-response protocol you apply upstream.

Ciao
--Louis <louis(at)bertrandtech(dot)on(dot)ca>

Louis Bertrand http://www.bertrandtech.on.ca
Bertrand Technical Services, Bowmanville, ON, Canada

OpenBSD: Because security matters. http://www.openbsd.org/

On Fri, 9 Jul 1999, Gene Sokolov wrote:

> I would be happier even with storing passwords at the server as a reversible
> hash. For example, xor all user passwords with some value (for example
> "PostgreSQL") and store base64(xor) strings instead of plain text.
>
> Challenge-response authentication based on MD5 or SHA hashing would be
> better, of course. A scheme like this would be reasonably secure:
>
> 1. Client initiates connection.
> 2. Server generates a long (16 byte) random value and passes it to the
> client.
> 3. Client generates a one way hash of the user ID, SHA(password), and the
> random number:
> hash := SHA(uid [+] SHA(password) [+] randomval)
> and sends openly uid and the hash back to the server
> 4. Server reconstructs the hash using stored SHA(password) and compares it
> with the received hash.
>
> Even more secure: don't store SHA(password) at the server but store
> SHA(password) XOR <mastervalue>.
>
> Gene Sokolov.
>
>
>
>
>
>

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Mark Hollomon 1999-07-09 13:44:24 Re: [HACKERS] Hashing passwords (was Updated TODO list)
Previous Message Leon 1999-07-09 13:04:13 Re: [HACKERS] Fwd: Joins and links