Florian: do you plan to provide a patch? On Sun, Sep 9, 2012 at 5:45 PM, Chris McDonough <chr...@plope.com> wrote:
> On Sun, 2012-09-09 at 17:40 +0200, Domen Kožar wrote: > > According > > to > https://github.com/gavincarr/mod_auth_tkt/blob/master/conf/02_auth_tkt.confand > > http://linux.die.net/man/3/mod_auth_tkt, mod_auth_tkt supports SHA256 > > and SHA512 since version 2.1 > > > > > > Relevant: https://bitbucket.org/ianb/paste/changeset/7f90a96378ed\ > > > Cool. We should do something similar I guess. > > > > On Sun, Sep 9, 2012 at 4:56 PM, Chris McDonough <chr...@plope.com> > > wrote: > > On Sun, 2012-09-09 at 06:55 -0700, Florian Rüchel wrote: > > > I was getting interested in how Pyramid's authentication > > works and > > > looked through the commonly used AuthTktAuthenticationPolicy > > code. I > > > found out it uses MD5 and the only thing keeping the cookie > > from being > > > forged is the secret. > > > > > > I see two different issues here: > > > First, MD5 is already known to have weaknesses and it would > > be a good > > > idea to have different algorithms available so they can be > > set. This > > > shouldn't be very hard to implement (I can write a patch if > > you > > > desire) and it can improve the security of any site. > > > Second, since everything depends on the single secret, I > > think it > > > should be documented better (communicated on at least the > > docstring > > > and the documentation) that the secret has to be strong > > (long, random, > > > maybe state a minimum length). > > > > > > > > > It would be fine by me if we made it possible to change the > > hashing > > algorithm. But it probably needs to continue to support md5, > > because > > it's purpose is to be compatible with Apache mod_auth_tkt > > cookies. I > > would be happy to accept a patch that allowed folks to plug in > > a > > different hashing algorithm, and explain to them that if they > > do, it > > will no longer be compatible with those cookies. > > > > There are also existing options that can help make it stronger > > regardless of the hash, such as including the IP in the token, > > IIRC. > > > > - C > > > > > > -- > > You received this message because you are subscribed to the > > Google Groups "pylons-devel" group. > > > > To post to this group, send email to > > pylons-devel@googlegroups.com. > > To unsubscribe from this group, send email to pylons-devel > > +unsubscr...@googlegroups.com. > > For more options, visit this group at > > http://groups.google.com/group/pylons-devel?hl=en. > > > > > > > > > > > > -- > > You received this message because you are subscribed to the Google > > Groups "pylons-devel" group. > > To post to this group, send email to pylons-devel@googlegroups.com. > > To unsubscribe from this group, send email to pylons-devel > > +unsubscr...@googlegroups.com. > > For more options, visit this group at > > http://groups.google.com/group/pylons-devel?hl=en. > > > -- > You received this message because you are subscribed to the Google Groups > "pylons-devel" group. > To post to this group, send email to pylons-devel@googlegroups.com. > To unsubscribe from this group, send email to > pylons-devel+unsubscr...@googlegroups.com. > For more options, visit this group at > http://groups.google.com/group/pylons-devel?hl=en. > > -- You received this message because you are subscribed to the Google Groups "pylons-devel" group. To post to this group, send email to pylons-devel@googlegroups.com. To unsubscribe from this group, send email to pylons-devel+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/pylons-devel?hl=en.