Re: md5 again

Поиск
Список
Период
Сортировка
От Vince Vielhaber
Тема Re: md5 again
Дата
Msg-id Pine.BSF.4.21.0007111315140.97059-100000@paprika.michvhf.com
обсуждение исходный текст
Ответ на Re: md5 again  (Tom Lane <tgl@sss.pgh.pa.us>)
Ответы Re: md5 again  (Tom Lane <tgl@sss.pgh.pa.us>)
Список pgsql-hackers
On Tue, 11 Jul 2000, Tom Lane wrote:

> Vince Vielhaber <vev@michvhf.com> writes:
> > Simple dictionary passwords.  Run them thru a script and compare the 
> > output.  
> 
> I was under the impression we'd prevented that by use of a random salt
> chosen on-the-fly for each login attempt ... have to go reread the
> thread to be sure though.

When I went back and reread the thread, it was PG sending the random
salt.  The username, password and random salt were hashed and sent 
back.  Therefore the username and random salt have both been on the
wire in the clear.

> In any case, if your threat model is a dictionary attack, what's to
> stop the attacker from using a dictionary of likely usernames as well?
> I still don't see much security gain from hashing the username.

dictionary of likely usernames: tgl, vev, buzz, wood_tick, ...  Now
that'd be a dictionary!  If only the random salt were on the wire, the
attacker would need to guess both the username and the password.

Vince.
-- 
==========================================================================
Vince Vielhaber -- KA8CSH    email: vev@michvhf.com    http://www.pop4.net128K ISDN from $22.00/mo - 56K Dialup from
$16.00/moat Pop4 Networking       Online Campground Directory    http://www.camping-usa.com      Online Giftshop
Superstore   http://www.cloudninegifts.com
 
==========================================================================





В списке pgsql-hackers по дате отправления:

Предыдущее
От: Bruce Momjian
Дата:
Сообщение: Re: md5 again
Следующее
От: Tom Lane
Дата:
Сообщение: Re: md5 again