From: markspace on
Dave Searles wrote:
>
> It seems to me that if you have the hash and the salt, and know the
> algorithm for convolving the password with the salt, then you can still
> carry out a dictionary attack.


A dictionary attack pre-computes the hash, and then just scans the
password file for a simple string match. The salt defeats this, because
each bit in the salt doubles the storage needed for the dictionary.

<http://en.wikipedia.org/wiki/Salt_%28cryptography%29>

You're right in that if the password itself is weak and could be
guessed, then all bets are off.
From: Roedy Green on
On Fri, 25 Sep 2009 09:37:13 +0200, Uli Kunkel <genijalac(a)yahoo.com>
wrote, quoted or indirectly quoted someone who said :

>I need to put a password for something as an application parameter.
>For now I'm using a properties file but the password isn't encrypted.

If your program can decrypt the passwords to plaintext, so can any
hacker. Further he can snoop on your socket when the apps sends the
passwords off to some other site. Anything you do to hide the
passwords is just disguising them from casual observation.
--
Roedy Green Canadian Mind Products
http://mindprod.com

"Civilisation advances by extending the number of important operations which we can perform without thinking about them."
~ Alfred North Whitehead (born: 1861-02-15 died: 1947-12-30 at age: 86)
From: rossum on
On Sun, 27 Sep 2009 11:47:14 -0700, Roedy Green
<see_website(a)mindprod.com.invalid> wrote:

>On Fri, 25 Sep 2009 09:37:13 +0200, Uli Kunkel <genijalac(a)yahoo.com>
>wrote, quoted or indirectly quoted someone who said :
>
>>I need to put a password for something as an application parameter.
>>For now I'm using a properties file but the password isn't encrypted.
>
>If your program can decrypt the passwords to plaintext, so can any
>hacker. Further he can snoop on your socket when the apps sends the
>passwords off to some other site. Anything you do to hide the
>passwords is just disguising them from casual observation.
The attacker can always find out what the plaintext is by one means or
another. The idea of security is to make it more costly in terms of
resources or time. Ideally the cost to determine the plaintext is
greater than the value to be gained from knowing it.

rossum

From: senatov on
On 09/25/2009 09:37 AM, Uli Kunkel wrote:

it is a good idea and standard solution to write in config file
not a password self , but his controll summ, hash number etc etc.

It's much more convinient to use.


--
Благословляю на добрыя дѣла
☦. Иаков

ඊස

From: Dave Searles on
markspace wrote:
> Dave Searles wrote:
>>
>> It seems to me that if you have the hash and the salt, and know the
>> algorithm for convolving the password with the salt, then you can
>> still carry out a dictionary attack.
>
>
> A dictionary attack pre-computes the hash, and then just scans the
> password file for a simple string match. The salt defeats this, because
> each bit in the salt doubles the storage needed for the dictionary.
>
> <http://en.wikipedia.org/wiki/Salt_%28cryptography%29>
>
> You're right in that if the password itself is weak and could be
> guessed, then all bets are off.

As Tom explained, the salt does not make any single password harder to
crack, but it does slow down an attack aimed at getting all (or the
first) dictionary-vulnerable password.

I was thinking in terms of protecting a particular targeted account
(yours, say, or the superuser account), while you two were apparently
thinking more of protecting all of the accounts in some statistical sense.

I still think the surest bet is to avoid using dictionary-attackable
passwords. :)