Hi,

Good summary Ben. Mike - no worries for jumping the gun, about 50% of
replies have been similar. I'm still learning how to tailor these
communications to reduce line noise; any suggestions would be welcome.

In fact, MD5 is fine for this use, the scheme doesn't rely on the
collision resistance property. And I suggest using salts to reduce the
impact of rainbow tables. SHA1 is probably the best bet, simply
because the js file is the smallest.

General response from TG/Django is basically +0 "we'll probably accept
it if you implement it". Obviously I'm not going to implement this for
every web framework under the sun, but I think I will for repoze.who.
If you guys want to add to AuthKit, happy to help/advise, if someone
else leads.

I am a security specialist, have worked in web security for many
years. This is a small improvement really. I remember the online
banking site where you could transfer money out of others' accounts,
by tampering with hidden fields. Or the multi-million currency trading
site where you could change the exchange rate in a hidden field. Or
the rich text editor where you could upload a .aspx file and
compromise the server. And many many more :-)

Paul
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"pylons-devel" group.
To post to this group, send email to pylons-devel@googlegroups.com
To unsubscribe from this group, send email to 
pylons-devel+unsubscr...@googlegroups.com
For more options, visit this group at 
http://groups.google.com/group/pylons-devel?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to