On Wednesday, 30 September 2015 at 14:53:31 UTC, H. S. Teoh wrote:
On Wed, Sep 30, 2015 at 08:30:47AM +0200, Jacob Carlborg via
Digitalmars-d wrote:
On 2015-09-29 23:32, Andrej Mitrovic via Digitalmars-d wrote:
>If you have plaintext passwords stored anywhere you are
>already screwed. ;)
The password always starts out in plaintext, or do you hash it
in the front end, as the users types? Since the back end
shouldn't trust the front end, it needs to hash it again.
[...]
The right way to do it is for the server to send a random
challenge which the front end (presumably running on the user's
machine) encrypts with the password, sending the ciphertext
back to the server. The plaintext password is never sent over
wire, yet the only way the client can provide the correct
response is if it knows the password to begin with.
T
right. Nonetheless, sometimes code does have to work with
sensitive data and you don't want it to leak outside the program
in unexpected ways.