[15887] in bugtraq

home help back first fref pref prev next nref lref last post

Re: @stake Security Advisory: NetZero Password Algorithm

daemon@ATHENA.MIT.EDU (Damien Miller)
Fri Jul 21 16:16:18 2000

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.LNX.4.21.0007211201171.10976-100000@mothra.mindrot.org>
Date:         Fri, 21 Jul 2000 12:02:39 +1000
Reply-To: Damien Miller <djm@MINDROT.ORG>
From: Damien Miller <djm@MINDROT.ORG>
X-To:         Dan Kaminsky <dankamin@CISCO.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <056d01bff138$e84100e0$16ab44ab@cisco.com>

On Tue, 18 Jul 2000, Dan Kaminsky wrote:


> Of course, the obvious question is how a system verify the correctness of a
> password without actually posessing that password.  It's a question that's
> rather repeatedly answered.  Password handling is simultaneously one of the
> few Solved Problems of Cryptography *and* one of the most misunderstood.
> Simply store a MD5 or SHA-1 one-way hash of the password.

Salted I hope, unless you like dictionary attacks.

-d

--
| "Bombay is 250ms from New York in the new world order" - Alan Cox
| Damien Miller - http://www.mindrot.org/
| Email: djm@mindrot.org (home) -or- djm@ibs.com.au (work)

home help back first fref pref prev next nref lref last post