Hello,
I'm using a nice little GDBM file for authentication. It just stores users
and passwords as SHA1 hashes. When I need to authenticate someone (fewer
than 15 lines in the dbm file) I just tie it and compare the SHA'd user
input against the hex value in the dbm file. (The file is not publicly
readable.)

It has been suggested, however, that this is not adequately secure and that
the passwords would be better stored crypted or some such. I don't really
see the difference between a SHA password and a crypted password in this
context. Wouldn't they be equally difficult to crack?

Oh, I should add that the authenticator runs as part of a server daemon on
a remote system, and so authentication is performed as the same user each
time.

Just wanted to collect some opinions before I go further. (I'm perfectly
willing to accept the possibility I'm wrong--if I weren't I wouldn't
ask--so fire away.)

Thanks,
John


-- 
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to