Pardon me for jumping in here, but I thought I'd try my hand at
putting this into some concrete examples.

Let's say we have an overly simple site with just three users (Jane,
Dick and Sally) and for some odd reason have made it a policy that
they can only choose from three passwords: "password", "secret" and
"hello". We'll say that our users have chosen the following passwords:
ID: username: password
1: Jane: hello
2: Dick: password
3: Sally: secret

Now we choose two different hashing methods.

Method #1 we take the password and "salt" it by adding the reverse of
the password so
     password_hash = hash(password+password[::-1])

and end up with hashes of:

Jane: 12DK789P
Dick: 486KX0AO
Sally: TY98B7C

A hacker somehow manages to steal our user table and gets our app
source so they know our salting and hashing methods. He simply runs
    for password in ["password", "secret", "hello"]:
        password_hash = hash(password+password[::-1])

and in three iteration has the password of all three users. In fact
even if we have 1,000 users Evil Hacker still got all 1,000 user's
passwords in only 3 iterations.

Method #2 we take the password and salt it by adding in the user's id,
so:
    password_hash = hash(password + user.id)

Now Mr Evil Hacker again manages to gain access to our database and
app source. Again he tries to figure out our user's passwords. He
starts out with Jane
    for password in ["password", "secret", "hello"]:
        password_hash = hash(password+user.id) #user.id in this case
is "1"

Just as before after at most three iterations the password has been
figured out. BUT unlike with method #1 Evil Hacker only has Jane's
password and not Dick or Sally's. To get both Dick and Sally's
password it will take up to 6 more iterations for a total of 9 (3
times more than required if we use method #1). For each additional
user it takes another 3 passes (assuming the correct password is
always the last one we try).  So our 1,000 user database now took
3,000 tries vs 3 - that's a huge improvement overall.

The thing is for any single user, it only takes 3 tries with either
method. BUT to get everyone's password it takes n*3 tries.  Up the
complexity and say that our users can pick from any current English
words in the Oxford English dictionary, Method #1 only takes at most
171,476 tries while #2 takes n*171476 tries. Then let your users pick
from upper & lower case letters, numbers 0-9 and common symbols giving
96 possibilities total and require 8 characters and there are now 7.2
Quadrillion possibilities! Sure the hacker can bother to generate (or
obtain) a rainbow table for all the possibilities - if we used Method
#1 they now have the password for every single user.  Switch over to
Method #2 and even with those 7.2 Quadrillion hashes in their rainbow
table Mr. Hacker only got one of our say 1,000 user's passwords - they
need to generate 1,000 more rainbow tables to get everyone's!. We'll
assume that our chosen hashing method means that there aren't any
readily available rainbow tables so our hacker needs to generate his
own rainbow tables. Check out http://www.lockdown.co.uk/?pg=combi&s=articles
to see just how long that'll take him (at best if he's got a
supercomputer It'll take 83.5 days *per user* - reality probably a few
years). Unless you've got something really, really valuable the random
hacker just isn't going to bother.

So there is deterministic vs random salting (we'll claim user ID is
basically random - it doesn't matter since it's clearly stored in the
database anyway).

Now since either way the hacker needed to somehow compromise our
database does all this really matter all that much? Which, for most
sites, is going to be more interesting - the user's passwords or all
of the other data probably stored in the clear in the other database
tables? If it's e-commerce or something then maybe the passwords are
useful, for most other things who cares, I can just read all the
user's "private" password protected data without having to worry about
figuring out their password beforehand.

Hope that clears things up a little.

~Brian

On Jul 31, 3:12 pm, Jonathan Lundell <jlund...@pobox.com> wrote:
> On Jul 31, 2009, at 12:56 PM, Julio wrote:
>
>
>
> >> If we have a deterministic (1:1) transform t() of the password, then
> >> hash(t(password)) is exactly some hash'(password). We've redefined  
> >> the
> >> hash function, and all we have to do is to create a new rainbow table
> >> for that function. That is, you can consider any 1:1 pre-hash
> >> transform of the password to be part of the hash function itself.
> >> Sure, if hash() was md5(), then hash'() will be something else, and
> >> you won't be able to take advantage of public rainbow tables. But you
> >> can create your own rainbow table for hash'.
>
> > I think here is where the source of confusion is, for the record I am
> > not talking a brute force known hash attack (which incidentally the
> > "random" salt used in your approach become "known" anyway).
>
> > If I read you correctly, you are saying that all you need to do is
> > generate a custom rainbow table with hash(t(password)) and you'll be
> > set, what I am saying is that you will have to generate that custom
> > rainbow table for *each* record you'd like to crack,
>
> No, that's not the case. You need only one rainbow table for the new  
> hash' function and you're done.
>
> hash(t(p)) is simply hash'(p), and all you need is the rainbow table  
> for hash' instead of hash.
>
> But this only works when t(p) is a 1:1 transform, and that's not the  
> case for random salt, even if the salt is non-secret.
>
> > now my point is
> > that your approach is exactly the same as the one I said earlier, by
> > adding a pseudo-random number as the salt, and that salt is 100%
> > discoverable (deterministic) you are just playing the same game but
> > with a different ball.
>
>
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"web2py-users" group.
To post to this group, send email to web2py@googlegroups.com
To unsubscribe from this group, send email to 
web2py+unsubscr...@googlegroups.com
For more options, visit this group at 
http://groups.google.com/group/web2py?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to