On 10/30/2010 11:11 PM, Darryl Lewis wrote:
Yeah, well reasoned rebuttal there....not.
That's why we encrypt passwords in unix, or haven't you looked at etc/passwd 
lately?

Have *you* ever looked at the etc/passwd?
First of all it is not encrypted. It contains a hash value of the password
so you cannot get the clear text password back.

Are you going to tell me that is complete nonsense?

Since connection to database requires a "real" password if encrypted
on the disk there must be a way to decrypt it at runtime.
This can be done by some obscurity algorithm or by providing a
key store password at application startup. Providing a key store
password is either done interactively or by a special hardware
devices. Since the second are expensive and the first one are
inappropriate for server based software, securing the passwords
in clear text form is the only solution. Just obscuring the
passwords with what ever algorithm is not secure.

> Having a username and password in clear text allows another account to be 
compromised.

If your database user equals to an user account on other box
then yes. But FYI those are usually kept different.
Aye you going to tell me that you use login accounts for
database accounts?


Regards
--
^TM

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to