Yes, I think the salting and hashing we're discussing is meant to protect the passwords once on the server (i.e., if the server/database is compromised). We'd need additional protection to protect them in transit. Another option would be login over SSL, no?
Anthony On Wednesday, September 21, 2011 9:02:07 AM UTC-4, mcm wrote: > > Plain WRONG. Even the guy knows it: " Note that a hacker could still sniff > the hashed password going over the network, and use that hash later to send > to the server and impersonate you. But at least the hacker can't use your > real password for other purposes." > > You can try with two salts. One of them must be one time random for each > auth request. Then you apply the hashing twice with the 2 salts on the > client and once on the server with the one time only. > > mic > Il giorno 21/set/2011 14:48, "Anthony" <[email protected]> ha scritto: > > +1 > > > > On Wednesday, September 21, 2011 2:43:20 AM UTC-4, pbreit wrote: > >> > >> It might not be a bad idea to improve password handling at this time. I > >> think the biggest problem is that password hases are not currently > salted. > >> The hmac_hash function appears to take a salt but I didn't see any > evidence > >> that is ever actually used. > >> > >> The Django model seems sufficient: > >> https://docs.djangoproject.com/en/dev/topics/auth/#passwords > >> > >> I think this is the code: > >> > https://github.com/django/django/blob/master/django/contrib/auth/utils.py > >> > >> Passwords would be stored like this: > >> sha1$a1976$a36cc8cbf81742a8fb52e221aaeab48ed7f58ab4 > >> (ie, algo$salt$hash) > >> > >> The hash algo is stored with the password. This makes it easier to > switch > >> algos in the future. The salt is also stored with the password which > many > >> people mistakenly think is unsecure. Also note that the salt is just a > >> simple random string and does not have to be particularly long to be > >> effective. > >> > >> If we did implement this approach, the next question is, could we also > >> implement a scheme whereby if the algo is changed, when someone goes to > >> change their password, the system can confirm that the old password is > >> provided correctly and then store the new password under the new scheme? > >> >

