Re: wiki password

2010-10-28 Thread Alexander Burger
On Wed, Oct 27, 2010 at 04:21:45PM -0400, David N Murray wrote: On Oct 27, Tomas Hlavaty scribed: not sure if I understand it well but it seems to me that your hash becomes the password. In other words, if I find out the hash, I can log in (e.g. using my own client). Yes, I

Re: wiki password

2010-10-28 Thread Tomas Hlavaty
Hi Alex, yes, it's all about prevention;-) Storing plain text passwords is no prevention. But encrypting them creates only an illusion of safety. I didn't suggest encrypting them but using hash+salt! We should not waste our time on irrelevant issues. Whether passwords are encrypted

Re: wiki password

2010-10-28 Thread Tomas Hlavaty
Hi Alex, I personally have bad experience with people storing passwords in plain text. Technically it might not be an issue (after all I think the wiki doesn't need passwords at all) but it is certainly one of those warning Thanks as ever for your input, but your argumentation is quite

Re: wiki password

2010-10-28 Thread Alexander Burger
Hi Tomas, But encrypting them creates only an illusion of safety. I didn't suggest encrypting them but using hash+salt! Yes, of course. That's nitpicking. Please excuse that I didn't pay attention to the terminology. 1) the whole discussion about acknowledging that some data are more

Re: wiki password

2010-10-28 Thread Alexander Burger
Hi Dave, It seems to have been lost somewhere along the way, but my original email indicated I use a one-way hash of the password (a la crypt(), but there Yes, I know. As Tomas already noticed, I mixed up encryption and hashing, though I'm well aware of the differences, and also used MD5 in my

Re: wiki password

2010-10-27 Thread Tomas Hlavaty
Hi Alex, You see the advantage in the current case: After Javier forgot his password (and started this thread) I sent him his old password in an encrypted mail. This is a big flaw. You should not be able ever to find out his password. Cheers, Tomas -- UNSUBSCRIBE:

Re: wiki password

2010-10-27 Thread Alexander Burger
Hi Tomas, This is a big flaw. You should not be able ever to find out his password. Why not? Nobody could stop me anyway. I could trace the program during execution, for example, to get the passwords. Cheers, - Alex -- UNSUBSCRIBE: mailto:picol...@software-lab.de?subject=unsubscribe

Re: wiki password

2010-10-27 Thread Edwin Eyan Moragas
On Wed, Oct 27, 2010 at 2:54 PM, Alexander Burger a...@software-lab.de wro= te: Hi Tomas, This is a big flaw. =A0You should not be able ever to find out his password. Why not? Nobody could stop me anyway. I could trace the program during execution, for example, to get the passwords. oh

Re: wiki password

2010-10-27 Thread David N Murray
On Oct 27, Alexander Burger scribed: Why not? Nobody could stop me anyway. I could trace the program during execution, for example, to get the passwords. Pardon me for jumping in (short time lurker; reading the archives alot). In general, I've always designed systems with passwords stored

Re: wiki password

2010-10-27 Thread dexen deVries
Hello all, On Wednesday 27 October 2010 16:15:35 Dave wrote: (...) I encrypt the passwords in the browser (using the same algorithm) and always transmit an encrypted password. There's no place to peek. (...) I believe you mean `I take a hash of password and some salt in the browser and

Re: wiki password

2010-10-27 Thread Tomas Hlavaty
Hi Alex and Edwin, This is a big flaw. =A0You should not be able ever to find out his password. Why not? Nobody could stop me anyway. I could trace the program during execution, for example, to get the passwords. oh yes! :D So you don't lock your house because it's impossible to make it

Re: wiki password

2010-10-27 Thread Tomas Hlavaty
Hi David, In general, I've always designed systems with passwords stored in a database as a one-way hash so that if the database gets compromised, you're not giving up users' passwords (it's a PITA to tell everyone to change their password). I encrypt the passwords in the browser (using the

Re: wiki password

2010-10-27 Thread Tomas Hlavaty
Hi Alex, This is a big flaw. You should not be able ever to find out his password. Why not? I could trace the program during execution, for example, to get the passwords. in a sense you are doing exactly this. And your trace log of plain text passwords goes to the picolisp database.

Re: wiki password

2010-10-27 Thread Alexander Burger
On Wed, Oct 27, 2010 at 08:50:51PM +0200, Tomas Hlavaty wrote: Nobody could stop me anyway. What do you mean? You are the provider of the service! I guess there is a missunderstanding somewhere. I mean as I'm the admin of that machine, I cannot be stopped to access the passwords. Even if

Re: wiki password

2010-10-27 Thread David N Murray
On Oct 27, Tomas Hlavaty scribed: not sure if I understand it well but it seems to me that your hash becomes the password. In other words, if I find out the hash, I can log in (e.g. using my own client). Yes, I suppose, but the only way I see you getting the hash is: a) steal the database

Re: wiki password

2010-10-27 Thread Alexander Burger
Hi Tomas, If you use plain text passwords and somebody gets hold of the data, he has all those passwords available for all users instantly. If you don't Well - in a commercial application, not in the Wiki - if he gets hold of the data, then we don't need to worry about the passwords any more

Re: wiki password

2010-10-27 Thread Tomas Hlavaty
Hi Alex, Nobody could stop me anyway. What do you mean? You are the provider of the service! I guess there is a missunderstanding somewhere. I mean as I'm the admin of that machine, I cannot be stopped to access the passwords. You are the provider of the service and as such users trust

Re: wiki password

2010-10-27 Thread Tomas Hlavaty
Hi David, not sure if I understand it well but it seems to me that your hash becomes the password. In other words, if I find out the hash, I can log in (e.g. using my own client). Yes, I suppose, but the only way I see you getting the hash is: a) steal the database b) be a MITM over

Re: wiki password

2010-10-27 Thread Tomas Hlavaty
Hi Alex, If you use plain text passwords and somebody gets hold of the data, he has all those passwords available for all users instantly. If you don't Well - in a commercial application, not in the Wiki - if he gets hold of the data, then we don't need to worry about the passwords any

Re: wiki password

2010-10-27 Thread Alexander Burger
Hi Tomas, I personally have bad experience with people storing passwords in plain text. Technically it might not be an issue (after all I think the wiki doesn't need passwords at all) but it is certainly one of those warning Thanks as ever for your input, but your argumentation is quite

Re: wiki password

2010-10-27 Thread Mansur Mamkin
Hi all! I'm fully agree with Alex, in this active discussion about passwords they sometimes forget about data itself :) ... But here we were talking about storing plain text passwords in a protected database, which would get compromised only if the whole database got into evil hands, which

Re: wiki password

2010-10-27 Thread Alexander Burger
On Wed, Oct 27, 2010 at 11:29:46PM +0200, Tomas Hlavaty wrote: Well - in a commercial application, not in the Wiki - if he gets hold of the data, then we don't need to worry about the passwords any more :-D yes, it's all about prevention;-) Storing plain text passwords is no prevention.

Re: wiki password

2010-10-26 Thread Alexander Burger
On Sat, Oct 23, 2010 at 12:18:45AM +0200, Javier wrote: Alex, please add a feature to reset the password, as I don't remember Thinking about it: What would be the best way? -- UNSUBSCRIBE: mailto:picol...@software-lab.de?subject=unsubscribe

Re: wiki password

2010-10-26 Thread dexen deVries
On Tuesday 26 October 2010 14:31:17 you wrote: On Sat, Oct 23, 2010 at 12:18:45AM +0200, Javier wrote: Alex, please add a feature to reset the password, as I don't remember Thinking about it: What would be the best way? A rather popular aggregator known as Hacker News is using manual

Re: wiki password

2010-10-26 Thread José Romero
El Tue, 26 Oct 2010 14:31:17 +0200 Alexander Burger a...@software-lab.de escribi=C3=B3: On Sat, Oct 23, 2010 at 12:18:45AM +0200, Javier wrote: Alex, please add a feature to reset the password, as I don't remember =20 Thinking about it: What would be the best way? Try this: 1. When the

Re: wiki password

2010-10-26 Thread José Romero
El Tue, 26 Oct 2010 16:57:10 +0200 Alexander Burger a...@software-lab.de escribi=C3=B3: Hi Jos=C3=A9, =20 1. When the user presses reset pass the button on a valid user, generate a random password. 2. Store it in a special field in the User object (rpass?) along with the date of which

Re: wiki password

2010-10-26 Thread José Romero
El Wed, 27 Oct 2010 01:00:38 +0800 Boh Yap bhy...@gmail.com escribi=C3=B3: hi, =20 send 2 emails, the 1st informing that passwd reset is activated and a following email will contain the temp. passwd. =20 then send the passwd in the 2nd email. And if the 2nd email does not mention an acct

Re: wiki password

2010-10-26 Thread Tomas Hlavaty
Hi Alex, 1. When the user presses reset pass the button on a valid user, generate a random password. 2. Store it in a special field in the User object (rpass?) along with the date of which that random pass was generated (rdate?) 3. Send it to the user in an email like this: Subject:

Re: wiki password

2010-10-26 Thread Alexander Burger
Hi Tomas, On the other hand, as far as I remember, the standard picolisp way of storing passwords in plain text and even sending them to the user editing dialog is even worse. No, this is not the case! The passwords do not go to the GUI, and never leave the server. Yes, they are stored in