I know you have the mantra of not breaking backwards compatibility,
but it is a pretty bad idea to have unsalted MD5 passwords.

For example, let's say your password is "massimo". The MD5 hash of
that happens to be "8cac5ac44b51f182143a43c4cdb6c4ac".

Even forgetting rainbow tables, you can simply do a search for it on
Google and you have 10+ pages telling you that it is the hash for
"massimo".

http://www.google.com/search?q=8cac5ac44b51f182143a43c4cdb6c4ac

On Jul 30, 8:10 pm, mdipierro <mdipie...@cs.depaul.edu> wrote:
> We cannot break backward compatibility. People should specify a key
> and use the HMAC+SHA512 anyway.
>
> Massimo
>
> On Jul 30, 9:49 pm, Bottiger <bottig...@gmail.com> wrote:
>
> > The CRYPT validator is unsecure because it uses unsalted MD5.
>
> > There are public rainbow tables that have unsalted MD5 passwords of up
> > to 10 characters long including symbols.
>
> > I highly recommend that if no "key" is specified, that CRYPT will
> > automatically salt the password based on a substring of the password
> > itself. For example:
>
> > password = "secretpass"
> > hash = md5(password+password[-1])
>
> > This will of course break backward compatibility, but this is a real
> > security vulnerability.
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"web2py-users" group.
To post to this group, send email to web2py@googlegroups.com
To unsubscribe from this group, send email to 
web2py+unsubscr...@googlegroups.com
For more options, visit this group at 
http://groups.google.com/group/web2py?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to