On Tue, May 6, 2008 at 9:55 PM, Iris Lames <[EMAIL PROTECTED]> wrote:
>
>
>
> >
> >
> >
> > > > I have a sample here:
> > > >       dn: uid=some.user,ou=people,dc=mydomain,dc=com
> > > >       userPassword:: VmVRdWFrczE=
> > > >
> > >
> >
> > > The password is a base64 encoded text string.
> >
> >
> > it is a strong indication that the password is base64 encoding because
> > of the "=" character at the end of password and not a normal crypt(3)
> > function with two characters salt + 11 characters hash function which
> > is 1 character shy from the password above..
> >
> > "VmVRdWFrczE=" = base64("VeQuaks1")
> >
> > i want to make sure first if the password is correct before we
> > conclude it is indeed base64 encoding... that is why i want her to try
> > it first...
> >
> > fooler.
> >
> Thanks, it works. It's indeed base64.
>
> Thanks...Thanks...Thanks!!!
>
> _________________________________________________
>  Philippine Linux Users' Group (PLUG) Mailing List
>  http://lists.linux.org.ph/mailman/listinfo/plug
>  Searchable Archives: http://archives.free.net.ph
>

Hi Iris, you should change the mechanism on your system by which
passwords are protected (either in transmission or in storage). If
it's possible, configure your system to use hash algorithms like MD5,
Blowfish (technically, it's not a hash algorithm, I'm referring to the
password format, not as a symmetric algorithm) or SHA, instead of
base64 encoding. If possible, you should encrypt communications
between your key/critical systems in your network. Your company should
have developed and implemented formal policies, standards and
guidelines regarding access control (which includes passwords and
account/login controls). If possible, these high level controls should
be enforced in all your systems using their built-in security
features.

If there are limitations by which your system can enforced a certain
security policy provision, you should implement alternative and/or
compensating security controls that would mitigate the same security
risks and meet the related security objectives. This is not limited to
the technology level, but may be implemented on the IT process and
people level as well. These limitations should be documented in an
exception document (if you have one).

Ariz is right, please read and understand your company's
information/data classification policy (if you have one) for guidance
regarding handling of confidential data/information. Confidential
information should not be disclosed to certain parties or entities
(What is "confidential", what is "handling", and who these "parties"
are, should be defined in your information classification policy).

-- 
Cheers,

Cris Masancay
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
http://lists.linux.org.ph/mailman/listinfo/plug
Searchable Archives: http://archives.free.net.ph

Reply via email to