We can probably make a validator called CRYPT2() so we don't have to
break backward compatibility. In my opinion though, this is a rather
insecure default for a framework that bills itself as being very
secure. I have seen many hacklogs where PHP frameworks were often
compromised by sql injection -> unsalted md5 dump -> rainbow lookup ->
attacker now accesses the entire server because the host used the same
password on his website as the root account.

I think SHA512 with a static key would be ok, as I have yet to see any
rainbow tables for that yet. But theoretically, having a different
salt for each password would prevent any attackers from generating 1
table for all the passwords from a static salt.

And with my method you wouldn't have to allocate additional storage to
get the same effect.

On Jul 31, 12:19 am, Fran <francisb...@googlemail.com> wrote:
> On Jul 31, 4:10 am, mdipierro <mdipie...@cs.depaul.edu> wrote:
>
> > We cannot break backward compatibility. People should specify a key
> > and use the HMAC+SHA512 anyway.
>
> Currently the default auth_user table just has:
> table[passfield].requires = [CRYPT()]
>
> So *all* instances should amend that, right?
>
> This should be in the scaffolding app & very clear in the 
> docs:http://web2py.com/examples/default/tools#authentication
> new manual (chapter 8)
>
> F
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"web2py-users" group.
To post to this group, send email to web2py@googlegroups.com
To unsubscribe from this group, send email to 
web2py+unsubscr...@googlegroups.com
For more options, visit this group at 
http://groups.google.com/group/web2py?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to