From: Lothar Kimmeringer on
senatov wrote:

> it is a good idea and standard solution to write in config file
> not a password self , but his controll summ, hash number etc etc.
>
> It's much more convinient to use.

Problem is that databases etc. don't accept hashes of passwords
but only the real stuff.


Regards, Lothar
--
Lothar Kimmeringer E-Mail: spamfang(a)kimmeringer.de
PGP-encrypted mails preferred (Key-ID: 0x8BC3CD81)

Always remember: The answer is forty-two, there can only be wrong
questions!
From: Leif Roar Moldskred on
Kenneth P. Turvey <evoturvey(a)gmail.com> wrote:
>
> For web based apps I don't know why using personal certificates never
> caught on. If a browser vendor made it easy to generate the
> certificates, then we wouldn't need all this password stuff.

Basically because there isn't any standarised system to manage and back
up such certificates nor any way to transparently take them with you
when you move to another computer.

A system based on some kind of USB token / USB stick would be suitable,
I think, but suffers the catch-22 that they wouldn't be very useful
until they were widely adopted by the industry and that they wouldn't
be likely to be widely adopted until they were very useful.

--
Leif Roar Moldskred
From: Kenneth P. Turvey on
On Tue, 29 Sep 2009 10:26:36 +0200, Lothar Kimmeringer wrote:

> Kenneth P. Turvey wrote:
>
>> For web based apps I don't know why using personal certificates never
>> caught on. If a browser vendor made it easy to generate the
>> certificates, then we wouldn't need all this password stuff.
>
> In a One Man One PC world this is practicable but as soon as you work
> with more than one PC - let alone smartphones - you try that once and
> never again if the service in question is of minor importance.

Passwords could be a backup system of authentication. You could even
provide ways to generate passwords when you need them, the way we do now
for password resets.

Certificates would provide everyone with single sign on if they were
widely supported.

--
Kenneth P. Turvey <evoturvey(a)gmail.com>
From: Dave Searles on
Leif Roar Moldskred wrote:
> Kenneth P. Turvey <evoturvey(a)gmail.com> wrote:
>> For web based apps I don't know why using personal certificates never
>> caught on. If a browser vendor made it easy to generate the
>> certificates, then we wouldn't need all this password stuff.
>
> Basically because there isn't any standarised system to manage and back
> up such certificates nor any way to transparently take them with you
> when you move to another computer.
>
> A system based on some kind of USB token / USB stick would be suitable,
> I think, but suffers the catch-22 that they wouldn't be very useful
> until they were widely adopted by the industry and that they wouldn't
> be likely to be widely adopted until they were very useful.

There's also the problem that certificate signing authorities charge
money, and not just a small amount of it, and not just a one-time fee
either.

If self-signed certs were allowed, that problem would go away and so
would the how-to-start-over and how-to-isolate problems. Self-signed
certs would be pseudonymous identities, and it would be feasible to use
different ones at different sites if you decided it was none of site A's
beeswax that you also used site B or whatever.
From: jebblue on
On Tue, 29 Sep 2009 10:28:58 +0200, Lothar Kimmeringer wrote:

> senatov wrote:
>
>> it is a good idea and standard solution to write in config file not a
>> password self , but his controll summ, hash number etc etc.
>>
>> It's much more convinient to use.
>
> Problem is that databases etc. don't accept hashes of passwords but only
> the real stuff.

What about Base 64 encoding of the hash?

--
// This is my opinion.