Doug's analysis of the patch is right on, but he doesn't go far enough.

1. The author of the patch clearly thinks that security consists of
sprinkling magic SHA-1 HMAC challenge response pixie dust over the code
in a random fashion.  This means that any revised patch must be viewed
with suspicion.

2. SHA-1 isn't even the recommended flavor of pixie dust anymore.  Use
SHA-256.

The right thing to do is have the login over SSL.

The next best thing to do is to use SRP.  It's the only thing that lets
you have secure passwords on the server and secure transmission of
passwords from the client.  There's a Javacsript library available at
http://sourceforge.net/projects/clipperz

Otherwise you have a choice of insecure password storage or insecure
password transmission.



_______________________________________________
Repoze-dev mailing list
Repoze-dev@lists.repoze.org
http://lists.repoze.org/listinfo/repoze-dev

Reply via email to