Re: So we're in agreement....
От | Vince Vielhaber |
---|---|
Тема | Re: So we're in agreement.... |
Дата | |
Msg-id | Pine.BSF.4.21.0005071439000.13987-100000@paprika.michvhf.com обсуждение исходный текст |
Ответ на | Re: So we're in agreement.... (Tom Lane <tgl@sss.pgh.pa.us>) |
Ответы |
Re: So we're in agreement....
|
Список | pgsql-hackers |
On Sun, 7 May 2000, Tom Lane wrote: > Vince Vielhaber <vev@michvhf.com> writes: > > My intent was not to send the username, but let the server figure it > > out by the response. > > That would be a neat trick. How will you do it? MD5 is not reversible. CLIENT: md5(salt_from_server + md5(username + md5(password))) SERVER: md5(salt_from_server + md5(username + stored_password)) The server runs thru all available usernames using the above algorithm. > I'm still of the opinion that anyone who is really concerned about > sniffing attacks ought to be using SSL, because protecting just their > password and not the data that will be exchanged later in the session is > unwise. So I'm not really excited about adding anti-sniffing frammishes > like this one. We've got a good scheme for the password; let's be > careful about adding "improvements" that won't carry their weight in > the real world. There's no such thing as a single security scheme that > addresses every possible vulnerability. Extending one part of your > security arsenal to partially solve problems that are better solved > by a different tool is just wasting time. Agreed. Vince. -- ========================================================================== Vince Vielhaber -- KA8CSH email: vev@michvhf.com http://www.pop4.net128K ISDN from $22.00/mo - 56K Dialup from $16.00/moat Pop4 Networking Online Campground Directory http://www.camping-usa.com Online Giftshop Superstore http://www.cloudninegifts.com ==========================================================================
В списке pgsql-hackers по дате отправления: