32 characters combination of numeric, alpha, lowercase, uppercase, and
use different salt for each password.

On Thu, Nov 6, 2008 at 4:17 PM, Karl <[EMAIL PROTECTED]> wrote:
>
>
>        Depends on the salt I guess...
>
>        I tried that 'tool' against the hashes stored in a site designed for a 
> client, where we double-loop the password thru MD5 and it came back 100% 
> "uncrackable"... and there is never a need to worry about salting anything.
>
>        Just strikes me as 100% absurdly simple to do, and 100% impossible to 
> break... never need to worry about who finds your code and tries to reverse 
> things, etc. The whole 'salting' thing strikes me as a pointless storm in a 
> teacup really. No overhead on the database, no extra tables to piss around 
> with, no need to do anything more than:
>
>        $password = md5(md5($inputpw));
>
>        ...and later on...
>
>        if (md5(md5($inputpw)) == $dbpass) {
>                ...accept...
>        } else {
>                ...reject...
>        }
>
>        If that doesn't beat all this salting hassle... I dunno what does!
>
>        Just my zwei pfennig worth...
>
>        Cheers...
>
>
>
> *********** REPLY SEPARATOR  ***********
>
> On 6/11/2008 at 3:58 p.m. Harvey Kane wrote:
>
>>A far far better approach would be to implement salting, which makes
>>sites like this useless against your passwords.
>
>
> ---
> Karl
> Senior Account Manager
> www.KIWIreviews.co.nz ... Where Your Views Count
> Please consider the environment before printing this email.
>
> Supporting Palmerston North's Santa... see our Community Gold Project page: 
> http://www.KIWIreviews.co.nz/santa - To be seen on TVNZ's 'Mucking In' show!
>
>
> >
>



-- 
Visit my website: http://onlinesid.com

--~--~---------~--~----~------------~-------~--~----~
NZ PHP Users Group: http://groups.google.com/group/nzphpug
To post, send email to [email protected]
To unsubscribe, send email to
[EMAIL PROTECTED]
-~----------~----~----~----~------~----~------~--~---

Reply via email to