Why double salt. That's the point of SSL. we should only be concerned with application level details not transport On Sep 21, 2011 10:27 AM, "Anthony" <abasta...@gmail.com> wrote: > Yes, I think the salting and hashing we're discussing is meant to protect > the passwords once on the server (i.e., if the server/database is > compromised). We'd need additional protection to protect them in transit. > Another option would be login over SSL, no? > > Anthony > > On Wednesday, September 21, 2011 9:02:07 AM UTC-4, mcm wrote: >> >> Plain WRONG. Even the guy knows it: " Note that a hacker could still sniff >> the hashed password going over the network, and use that hash later to send >> to the server and impersonate you. But at least the hacker can't use your
>> real password for other purposes." >> >> You can try with two salts. One of them must be one time random for each >> auth request. Then you apply the hashing twice with the 2 salts on the >> client and once on the server with the one time only. >> >> mic >> Il giorno 21/set/2011 14:48, "Anthony" <abas...@gmail.com> ha scritto: >> > +1 >> > >> > On Wednesday, September 21, 2011 2:43:20 AM UTC-4, pbreit wrote: >> >> >> >> It might not be a bad idea to improve password handling at this time. I >> >> think the biggest problem is that password hases are not currently >> salted. >> >> The hmac_hash function appears to take a salt but I didn't see any >> evidence >> >> that is ever actually used. >> >> >> >> The Django model seems sufficient: >> >> https://docs.djangoproject.com/en/dev/topics/auth/#passwords >> >> >> >> I think this is the code: >> >> >> https://github.com/django/django/blob/master/django/contrib/auth/utils.py >> >> >> >> Passwords would be stored like this: >> >> sha1$a1976$a36cc8cbf81742a8fb52e221aaeab48ed7f58ab4 >> >> (ie, algo$salt$hash) >> >> >> >> The hash algo is stored with the password. This makes it easier to >> switch >> >> algos in the future. The salt is also stored with the password which >> many >> >> people mistakenly think is unsecure. Also note that the salt is just a >> >> simple random string and does not have to be particularly long to be >> >> effective. >> >> >> >> If we did implement this approach, the next question is, could we also >> >> implement a scheme whereby if the algo is changed, when someone goes to >> >> change their password, the system can confirm that the old password is >> >> provided correctly and then store the new password under the new scheme? >> >> >>