I am wearing said hat and am freaking out right now :-)

Just kidding and good point. I guess it would be nice if clients like Hector
had an option to use TLS/SSL to encapsulate the application protocol.

But even SSL/TLS is subject to attacks from tools like SSLSNIFF:
http://www.thoughtcrime.org/software/sslsniff



On Wed, May 18, 2011 at 2:33 PM, Aaron Morton <aa...@thelastpickle.com>wrote:

> Also if you were wearing an aluminium foil hat you may also be concerned
> about how the password is sent to the server.
>
> Again though, see previous "I am not a security guy" comment and helpful
> link from Jonathan confirming that statement :)
> Cheers
>
> -----------------
> Aaron Morton
> Freelance Cassandra Developer
> @aaronmorton
> http://www.thelastpickle.com
>
> On 19/05/2011, at 1:19 AM, Ted Zlatanov <t...@lifelogs.com> wrote:
>
> > On Tue, 17 May 2011 15:52:22 -0700 Sameer Farooqui <
> cassandral...@gmail.com> wrote:
> >
> > SF> Would still be nice though to use the bcrypt hash over MD5 for
> stronger
> > SF> security.
> >
> > I used MD5 when I proposed SimpleAuthenticator for two reasons:
> >
> > 1) SimpleAuthenticator is supposed to be a demo of the authentication
> > interface.  It can be used for testing and trivial setups, but I
> > wouldn't use it in production.  So it's meant to get you going easily,
> > not to serve you long-term.
> >
> > 2) MD5 is built into Java.  At the time, bcrypt and SHA-* were not.  I
> > used MD5 only so the passwords are not stored in the clear, not to
> > provide production-level security.
> >
> > You should consider carefully the implications of storing passwords in a
> > file on a database server, no matter how they are encrypted.  It would
> > be better to write a trivial AD/LDAP/etc. authenticator that fits your
> > specific needs and doesn't rely on a local file.
> >
> > Ted
> >
>

Reply via email to