Why double salt. That's the point of SSL. we should only be concerned with
application level details not transport
On Sep 21, 2011 10:27 AM, "Anthony" <abasta...@gmail.com> wrote:
> Yes, I think the salting and hashing we're discussing is meant to protect
> the passwords once on the server (i.e., if the server/database is
> compromised). We'd need additional protection to protect them in transit.
> Another option would be login over SSL, no?
>
> Anthony
>
> On Wednesday, September 21, 2011 9:02:07 AM UTC-4, mcm wrote:
>>
>> Plain WRONG. Even the guy knows it: " Note that a hacker could still
sniff
>> the hashed password going over the network, and use that hash later to
send
>> to the server and impersonate you. But at least the hacker can't use your

>> real password for other purposes."
>>
>> You can try with two salts. One of them must be one time random for each
>> auth request. Then you apply the hashing twice with the 2 salts on the
>> client and once on the server with the one time only.
>>
>> mic
>> Il giorno 21/set/2011 14:48, "Anthony" <abas...@gmail.com> ha scritto:
>> > +1
>> >
>> > On Wednesday, September 21, 2011 2:43:20 AM UTC-4, pbreit wrote:
>> >>
>> >> It might not be a bad idea to improve password handling at this time.
I
>> >> think the biggest problem is that password hases are not currently
>> salted.
>> >> The hmac_hash function appears to take a salt but I didn't see any
>> evidence
>> >> that is ever actually used.
>> >>
>> >> The Django model seems sufficient:
>> >> https://docs.djangoproject.com/en/dev/topics/auth/#passwords
>> >>
>> >> I think this is the code:
>> >>
>> https://github.com/django/django/blob/master/django/contrib/auth/utils.py
>> >>
>> >> Passwords would be stored like this:
>> >> sha1$a1976$a36cc8cbf81742a8fb52e221aaeab48ed7f58ab4
>> >> (ie, algo$salt$hash)
>> >>
>> >> The hash algo is stored with the password. This makes it easier to
>> switch
>> >> algos in the future. The salt is also stored with the password which
>> many
>> >> people mistakenly think is unsecure. Also note that the salt is just a

>> >> simple random string and does not have to be particularly long to be
>> >> effective.
>> >>
>> >> If we did implement this approach, the next question is, could we also

>> >> implement a scheme whereby if the algo is changed, when someone goes
to
>> >> change their password, the system can confirm that the old password is

>> >> provided correctly and then store the new password under the new
scheme?
>> >>
>>

Reply via email to