On 12/21/2011 12:41 AM, Christof Wollenhaupt wrote:
> If you use CRC functions you should salt the value. That is adding a few
> application specific characters before or after the password, then passing
> the result to SYS(2007) - or whatever else. Adding more sophisticated
> functions to calculate the hash value would be possible but not add
> security value. Once you went beyond storing the password, the application
> (with code injection) becomes the weakest link, not cracking a password.
>


That makes sense.  Seems like me just getting and storing the CRC of 
"<whatever prefix I choose here>" along with their password and then on 
the login screen, comparing that same prefix + their entered password 
against the stored value would be sufficient.

I see that approach as responsible.  I'd like to hear someone give an 
explanation as to why it wouldn't be (responsible).

Thanks,
--Mike


-- 
Mike Babcock, MCP
MB Software Solutions, LLC
President, Chief Software Architect
http://mbsoftwaresolutions.com
http://fabmate.com
http://twitter.com/mbabcock16

_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://leafe.com/mailman/listinfo/profox
OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message: 
http://leafe.com/archives/byMID/profox/[email protected]
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to