Joel is right. A "known plaintext" attack is very effective... and sending a sample of 
you encryption to anyone is risky.

Also, just for information sake, you can recover passwords from digest form... sort 
of. Ever heard of "Crack" or "John the Ripper"?

If you enforce strong passwords then it is much more difficult, but the "known 
plaintext" attack will still succeed, eventually. Even 128 bit encryption has been 
broken this way. To make things worse, if a user can set his/her password to 
"password" I'd give your security 10 minutes before it cracks. 

I have a suggestion that might help. You could send cookie that is just a pointer to a 
file location or a key of a database on your server. One of you severs could use the 
(more or less) harmless information that you send in the cookie to look up what the 
digest password would be. 

That would prevent "the evil hacker" from breaking into your site using data that you 
are sending to him/her.
 
 Cybear
------------------------------------------------------------------------------------
> Curtis,
> are you sure that sending the digest back to the client in cookie form is a
> good idea?
> 
> I mean, if I were a hacker, could I not register and then retrieve the
> digest - you then have the plain text and the cipher text. (admittedly you
> would have to know that whats in your cookie is a digest rather than another
> form of session id but stilll...)
> 
ps - hackers are called hackers because they play with things. Eventually, if you site 
is interesting enough, someone would try decrypting the info in the cookie.


-- 
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to