Re: wiki password

2010-10-28 Thread Alexander Burger
Hi Dave, > It seems to have been lost somewhere along the way, but my original email > indicated I use a one-way hash of the password (a la crypt(), but there Yes, I know. As Tomas already noticed, I mixed up encryption and hashing, though I'm well aware of the differences, and also used MD5 in m

Re: wiki password

2010-10-28 Thread David N Murray
On Oct 28, Alexander Burger scribed: > On Wed, Oct 27, 2010 at 04:21:45PM -0400, David N Murray wrote: > > Or simply create an account for yourself and analyze the encryption of > your own password in the client. As the client needs the full > information, including the encryption keys, you might

Re: wiki password

2010-10-28 Thread Alexander Burger
Tomas, just to make it clear (again, as I already wrote this in this thread): It would b extremely simple to "hash" the passwords. Just call something like (native "libcrypto.so" "MD5" '(B . 16) Str (length Str) '(NIL (16))) in two places (where the passwords are stored, and where they are c

Re: wiki password

2010-10-28 Thread Alexander Burger
Hi Tomas, > > But encrypting them creates only an illusion of safety. > I didn't suggest encrypting them but using hash+salt! Yes, of course. That's nitpicking. Please excuse that I didn't pay attention to the terminology. > 1) the whole discussion about acknowledging that some data are more >

Re: wiki password

2010-10-28 Thread Tomas Hlavaty
Hi Alex, >> I personally have bad experience with people storing passwords in >> plain text. Technically it might not be an issue (after all I think >> the wiki doesn't need passwords at all) but it is certainly one of >> those warning > > Thanks as ever for your input, but your argumentation is

Re: wiki password

2010-10-28 Thread Tomas Hlavaty
Hi Alex, >> yes, it's all about prevention;-) Storing plain text passwords is no >> prevention. > > But encrypting them creates only an illusion of safety. I didn't suggest encrypting them but using hash+salt! > We should not waste our time on irrelevant issues. Whether passwords > are encrypte

Re: wiki password

2010-10-27 Thread Alexander Burger
On Wed, Oct 27, 2010 at 04:21:45PM -0400, David N Murray wrote: > On Oct 27, Tomas Hlavaty scribed: > > > > > not sure if I understand it well but it seems to me that your hash > > becomes the password. In other words, if I find out the hash, I can log > > in (e.g. using my own client). > > > >

Re: wiki password

2010-10-27 Thread Alexander Burger
On Wed, Oct 27, 2010 at 11:29:46PM +0200, Tomas Hlavaty wrote: > > Well - in a commercial application, not in the Wiki - if he gets hold > > of the data, then we don't need to worry about the passwords any more > > :-D > > yes, it's all about prevention;-) Storing plain text passwords is no > pre

Re: wiki password

2010-10-27 Thread Mansur Mamkin
Hi all! I'm fully agree with Alex, in this active discussion about passwords they sometimes forget about data itself :) ... But here we were talking about storing plain text passwords in a protected database, which would get compromised only if the whole database got into evil hands, which i

Re: wiki password

2010-10-27 Thread Alexander Burger
Hi Tomas, > I personally have bad experience with people storing passwords in plain > text. Technically it might not be an issue (after all I think the wiki > doesn't need passwords at all) but it is certainly one of those warning Thanks as ever for your input, but your argumentation is quite in

Re: wiki password

2010-10-27 Thread Tomas Hlavaty
Hi Alex, >> If you use plain text passwords and somebody gets hold of the data, >> he has all those passwords available for all users instantly. If you >> don't > > Well - in a commercial application, not in the Wiki - if he gets hold > of the data, then we don't need to worry about the passwords

Re: wiki password

2010-10-27 Thread Tomas Hlavaty
Hi David, >> not sure if I understand it well but it seems to me that your hash >> becomes the password. In other words, if I find out the hash, I can log >> in (e.g. using my own client). >> > > Yes, I suppose, but the only way I see you getting the hash is: > a) steal the database > b) be a MIT

Re: wiki password

2010-10-27 Thread Tomas Hlavaty
Hi Alex, >>> Nobody could stop me anyway. >> >> What do you mean? You are the provider of the service! I guess >> there is a missunderstanding somewhere. > > I mean as I'm the admin of that machine, I cannot be stopped to access > the passwords. You are the provider of the service and as such

Re: wiki password

2010-10-27 Thread Alexander Burger
Hi Tomas, > If you use plain text passwords and somebody gets hold of the data, he > has all those passwords available for all users instantly. If you don't Well - in a commercial application, not in the Wiki - if he gets hold of the data, then we don't need to worry about the passwords any more

Re: wiki password

2010-10-27 Thread David N Murray
On Oct 27, Tomas Hlavaty scribed: > > not sure if I understand it well but it seems to me that your hash > becomes the password. In other words, if I find out the hash, I can log > in (e.g. using my own client). > Yes, I suppose, but the only way I see you getting the hash is: a) steal the datab

Re: wiki password

2010-10-27 Thread Alexander Burger
On Wed, Oct 27, 2010 at 08:50:51PM +0200, Tomas Hlavaty wrote: > > Nobody could stop me anyway. > > What do you mean? You are the provider of the service! I guess there > is a missunderstanding somewhere. I mean as I'm the admin of that machine, I cannot be stopped to access the passwords. Even

Re: wiki password

2010-10-27 Thread Tomas Hlavaty
Hi Alex, >> This is a big flaw. You should not be able ever to find out his >> password. > > Why not? > > I could trace the program during execution, for example, to get the > passwords. in a sense you are doing exactly this. And your trace log of plain text passwords goes to the picolisp datab

Re: wiki password

2010-10-27 Thread Tomas Hlavaty
Hi David, > In general, I've always designed systems with passwords stored in a > database as a one-way hash so that if the database gets compromised, > you're not giving up users' passwords (it's a PITA to tell everyone to > change their password). I encrypt the passwords in the browser (using >

Re: wiki password

2010-10-27 Thread Tomas Hlavaty
Hi Alex and Edwin, >>> This is a big flaw. =A0You should not be able ever to find out his >>> password. >> >> Why not? >> >> Nobody could stop me anyway. I could trace the program during execution, >> for example, to get the passwords. > > oh yes! :D So you don't lock your house because it's impo

Re: wiki password

2010-10-27 Thread dexen deVries
Hello all, On Wednesday 27 October 2010 16:15:35 Dave wrote: > (...) I encrypt the passwords in the browser (using the > same algorithm) and always transmit an encrypted password. There's no > place to peek. (...) I believe you mean `I take a hash of password and some salt in the browser and

Re: wiki password

2010-10-27 Thread David N Murray
On Oct 27, Alexander Burger scribed: > > Why not? > > Nobody could stop me anyway. I could trace the program during execution, > for example, to get the passwords. > Pardon me for jumping in (short time lurker; reading the archives alot). In general, I've always designed systems with passwords st

Re: wiki password

2010-10-27 Thread Edwin Eyan Moragas
On Wed, Oct 27, 2010 at 2:54 PM, Alexander Burger wro= te: > Hi Tomas, > >> This is a big flaw. =A0You should not be able ever to find out his >> password. > > Why not? > > Nobody could stop me anyway. I could trace the program during execution, > for example, to get the passwords. oh yes! :D /e

Re: wiki password

2010-10-27 Thread Alexander Burger
Hi Tomas, > This is a big flaw. You should not be able ever to find out his > password. Why not? Nobody could stop me anyway. I could trace the program during execution, for example, to get the passwords. Cheers, - Alex -- UNSUBSCRIBE: mailto:picol...@software-lab.de?subject=unsubscribe

Re: wiki password

2010-10-26 Thread Tomas Hlavaty
Hi Alex, > You see the advantage in the current case: After Javier forgot his > password (and started this thread) I sent him his old password in an > encrypted mail. This is a big flaw. You should not be able ever to find out his password. Cheers, Tomas -- UNSUBSCRIBE: mailto:picol...@softwa

Re: wiki password

2010-10-26 Thread Alexander Burger
Hi Tomas, > On the other hand, as far as I remember, the "standard" picolisp way of > storing passwords in plain text and even sending them to the user > editing dialog is even worse. No, this is not the case! The passwords do not go to the GUI, and never leave the server. Yes, they are stored

Re: wiki password

2010-10-26 Thread Tomas Hlavaty
Hi Dexen, >>> Alex, please add a feature to reset the password, as I don't >>> remember >> >> Thinking about it: What would be the best way? > > A rather popular aggregator known as Hacker News is using manual password > reset method. Interesting! There is even better way for a wiki. Simply _

Re: wiki password

2010-10-26 Thread Tomas Hlavaty
Hi Alex, >> 1. When the user presses reset pass the button on a valid user, generate >> a random password. >> 2. Store it in a special field in the User object (rpass?) along >> with the date of which that random pass was generated (rdate?) >> 3. Send it to the user in an email like this: >> Subje

Re: wiki password

2010-10-26 Thread José Romero
El Wed, 27 Oct 2010 01:00:38 +0800 Boh Yap escribi=C3=B3: > hi, >=20 > send 2 emails, the 1st informing that passwd reset is activated and a > following email will contain the temp. passwd. >=20 > then send the passwd in the 2nd email. And if the 2nd email does not > mention an acct name, then its

Re: wiki password

2010-10-26 Thread Boh Yap
hi, send 2 emails, the 1st informing that passwd reset is activated and a following email will contain the temp. passwd. then send the passwd in the 2nd email. And if the 2nd email does not mention an acct name, then its reasonably safe. 2010/10/26 Jos=E9 Romero : > El Tue, 26 Oct 2010 16:57:1

Re: wiki password

2010-10-26 Thread José Romero
El Tue, 26 Oct 2010 16:57:10 +0200 Alexander Burger escribi=C3=B3: > Hi Jos=C3=A9, >=20 > > 1. When the user presses reset pass the button on a valid user, > > generate a random password. > > 2. Store it in a special field in the User object (rpass?) along > > with the date of which that random pa

Re: wiki password

2010-10-26 Thread Alexander Burger
Hi José, > 1. When the user presses reset pass the button on a valid user, generate > a random password. > 2. Store it in a special field in the User object (rpass?) along > with the date of which that random pass was generated (rdate?) > 3. Send it to the user in an email like this: > Subject: Pa

Re: wiki password

2010-10-26 Thread José Romero
El Tue, 26 Oct 2010 14:31:17 +0200 Alexander Burger escribi=C3=B3: > On Sat, Oct 23, 2010 at 12:18:45AM +0200, Javier wrote: > > Alex, please add a feature to reset the password, as I don't > > remember >=20 > Thinking about it: What would be the best way? Try this: 1. When the user presses rese

Re: wiki password

2010-10-26 Thread dexen deVries
On Tuesday 26 October 2010 14:31:17 you wrote: > On Sat, Oct 23, 2010 at 12:18:45AM +0200, Javier wrote: > > Alex, please add a feature to reset the password, as I don't remember > > Thinking about it: What would be the best way? A rather popular aggregator known as Hacker News is using manual pa

Re: wiki password

2010-10-26 Thread Alexander Burger
On Sat, Oct 23, 2010 at 12:18:45AM +0200, Javier wrote: > Alex, please add a feature to reset the password, as I don't remember Thinking about it: What would be the best way? -- UNSUBSCRIBE: mailto:picol...@software-lab.de?subject=unsubscribe

Re: wiki password

2010-10-23 Thread Alexander Burger
Hi Javier, > Alex, please add a feature to reset the password, as I don't remember > mine and can't log in the wiki! Thanks, good idea! Will do that. Cheers, - Alex -- UNSUBSCRIBE: mailto:picol...@software-lab.de?subject=unsubscribe

wiki password

2010-10-22 Thread Javier
Alex, please add a feature to reset the password, as I don't remember mine and can't log in the wiki! Thanks in advance. -- UNSUBSCRIBE: mailto:picol...@software-lab.de?subject=unsubscribe