[352] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Experimental implementation of SimpleMD5

daemon@ATHENA.MIT.EDU (Dave Kristol)
Thu Jan 26 15:14:37 1995

Date: Thu, 26 Jan 95 09:36:59 EST
From: dmk@allegra.att.com (Dave Kristol)
To: www-security@ns2.rutgers.edu
Cc: www-security@ns2.rutgers.edu
Reply-To: www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu

I, too, have concerns about the added complexity of Phillip's proposal,
but this message concerns a much more mundate nit.  Phillip describes
taking this function:

  > 	MD5(username '@' domain ':' password)

(I assume "domain" is the fully-qualified domain name of the client,
as calculated by the server.)

Perhaps everyone else things of "username" as merely a sequence of
alphanumeric characters.  However, it isn't so-restricted, and for
an application of ours, we actually use something like
	username@domain
where Phillip uses "username" above.  A parsing ambiguity therefore
arises for something like
	username=dmk@foobar
	domain=	 research.att.com
	password=nevermind
giving
	dmk@foobar@research.att.com:nevermind

Although it's less esthetic, let me propose the function be rendered
	MD5(username:domain:password)
since ':' already had to be special.

Dave Kristol

home help back first fref pref prev next nref lref last post