Re: questions on Login Security FAQ

2008-09-22 Thread JasonG
Dearest Reinier, I'm a little perturbed by your response. Let's start with session handling. I had initially made a point that if you are using a J2EE back end, then you don't have to worry about handling session IDs because that is pretty much handled for you. You continue to make some sort

Re: questions on Login Security FAQ

2008-09-22 Thread JasonG
I think you're trying to argue that your solution will stop the hacker because he'll never guess that he's supposed to hash username+password instead of just password. No. I'm making the point that in a well organized environment, the database and application are separated and through

Re: questions on Login Security FAQ

2008-09-20 Thread Ed
So, that very shallow review says: It's all good. But no guarantees on the jasypt author's security chops. Thanks Reinier (your pointers are exactly how I use it :) ) -- Ed --~--~-~--~~~---~--~~ You received this message because you are subscribed to the

Re: questions on Login Security FAQ

2008-09-20 Thread Ed
I like JaSypt, works fine and very friendly. Has some nice Spring integration features such that you can store the hashed value of some password in the spring property file instead of the plain password. Can be useful... It sounds like I am having JaSypt shares :( ;)

Re: questions on Login Security FAQ

2008-09-19 Thread Ed
Like Rob mentioned, always interesting to read Reinier's post :)... B) BCrypt (and you should use BCrypt, or you Fail Security. Seriously. Don't think about it, you failed the test. Use tools written by the experts) - is a better take on a technique called 'salt hashing', I noticed you

Re: questions on Login Security FAQ

2008-09-19 Thread JasonG
Reinier, Thanks for the additional input. Can I get some more clarification from you though? First of all, I don't understand your (A) response. I said you don't need to worry so much about passing session IDs since the app server will pretty much handle that for you... and your response

Re: questions on Login Security FAQ

2008-09-19 Thread Reinier Zwitserloot
I don't know jasypt, so I can't make guarantees (actually, nobody can, but you know what I mean). However, there are two good signs: 1) The API is specifically for password checking. This is a lot better than using a generic hasher and doing the salting yourself. The authors of the library had

Re: questions on Login Security FAQ

2008-09-19 Thread Reinier Zwitserloot
Answers inline... On Sep 19, 3:12 pm, JasonG [EMAIL PROTECTED] wrote: First of all, I don't understand your (A) response.   I said you don't need to worry so much about passing session IDs since the app server will pretty much handle that for you... and your response seems to just reiterate

Re: questions on Login Security FAQ

2008-09-19 Thread Ian Bambury
-- Reinier gently nudging the casual reader back onto the straight and narrow with a velvet touch Zwitserloot I think the 'people person' quote was closer :-) Ian --~--~-~--~~~---~--~~ You received this message because you are subscribed to the Google Groups

Re: questions on Login Security FAQ

2008-09-18 Thread alex.d
What about easy-hashing on the client side like for example md5? Sure, lately there were several reports about possibilities to crack it quicker than expected(a few hours or even minutes) but i haven't seen any working tool to make it work yet. So hasing with md5 on the client side, and than with

Re: questions on Login Security FAQ

2008-09-18 Thread alex.d
Hi Alex, alex.d schrieb: What about easy-hashing on the client side like for example md5? Sure, lately there were several reports about possibilities to crack it quicker than expected(a few hours or even minutes) but i haven't seen any working tool to make it work yet. You can't

Re: questions on Login Security FAQ

2008-09-18 Thread Lothar Kimmeringer
alex.d schrieb: And if somebody is ready to go the hard way, well, then there is probably not that much you can do about it - if somebody want's to hack you - they will succeed. NPI: Strange point of view. I hope you're not working for a website where I place orders using my credit-cards.

Re: questions on Login Security FAQ

2008-09-18 Thread al0
I dare to say that SHA1-weakness is mostly of theoretical value. It is secure enough for any practicaly purpose (save probably digital signing of documents with multiyear lifespan, and protecting of extremely sensitive information that may attract attackers that have in their disposision

Re: questions on Login Security FAQ

2008-09-18 Thread Reinier Zwitserloot
JasonG: Thanks for being a nice example of the cluelessness of your average programmer. You've got it all, totally, 100% backwards. Don't feel too insulted, you're like almost everyone else out there. However, you should most definitely stop handing out security advice. Seriously. A) J2EE

Re: questions on Login Security FAQ

2008-09-18 Thread Rob Coops
Always fun to read a Reinier comment to pretty much anyone. Seriously Reinier though you usualy are quite correct with your facts and knowledge you might try to leave the baseball bat on the filed and not bash someonce head in for a change. I would not be surprized if people are scared to post

Re: questions on Login Security FAQ

2008-09-18 Thread Reinier Zwitserloot
We need to invent a TCP/IP compatible cluestick on the double! On Sep 18, 6:36 pm, Ian Petersen [EMAIL PROTECTED] wrote: On Thu, Sep 18, 2008 at 11:31 AM, Rob Coops [EMAIL PROTECTED] wrote: Always fun to read a Reinier comment to pretty much anyone. Seriously Reinier though you usualy are