Nikola Janceski wrote:


> Uh... exactly what are you going to be using it for?
> You might want to check out the function call crypt() in the perlfunc
pages.
>
> > -----Original Message-----
> > From: Gregory Matthews [mailto:[EMAIL PROTECTED]]
> > Sent: Thursday, March 28, 2002 2:30 PM
> > To: [EMAIL PROTECTED]
> > Subject: Creating a Unique Key
> >
> >
> > What is the best way to create a unique, almost impossible to guess,
> > KEY, i.e., ftu880oli88UI8flpq, which can in turn be used as part of a
> > security string, i.e., username: ftu880oli88UI8flpq ?

Check out:


http://www.cs.cornell.edu/People/egs/syslunch-spring02/syslunchsp02/webauth_
tr.pdf

It details how the authors weakened or broke the authentication mechanisms
of a number of prominent e-commerce sites, and gives background information
on doing authentication well. One of the things it talks about is the
weakness of the authentication scheme at the Wall Street Journal's web page
caused by a misunderstanding of how crypt works.

They do propose a stronger authentication scheme.

Tagore Smith




-- 
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to