On 07-05-2009 13:16:48 +0200, [email protected] wrote:
> As I'm working on changing the password backend of M5 to use hashes
> instead of cypher3d clear text passwords[1], I have to bump the wire
> protocol level from 8 to 9, since the client will have to construct the
> challenge response differently.

The changes made to the protocol only affect the login procedure.

In v8 the password would be clear text, in v9 it is a hash.  The
hash algorithm used is defined by the server in the challenge.

v8:
<-  <salt>:<server>:8:<hashes>:<byteorder>
->  <byteorder>:<user>:{<hash>}<hash(password+salt)>:<lang>:<db>:

v9:
<-  <salt>:<server>:9:<hashes>:<byteorder>:<pwhash>:
->  <byteorder>:<user>:{<hash>}{hash(pwhash(password)+salt)>:<lang>:<db>:

In v9 the <hashes> crypt and plain have been removed, RIPEMD160, SHA512,
SHA384, SHA256 and SHA224 were added.  <pwhash> can be any of RIPEMD160,
SHA512, SHA384, SHA256, SHA224, SHA1 or MD5.

------------------------------------------------------------------------------
The NEW KODAK i700 Series Scanners deliver under ANY circumstances! Your
production scanning environment may not be a perfect world - but thanks to
Kodak, there's a perfect scanner to get the job done! With the NEW KODAK i700
Series Scanner you'll get full speed at 300 dpi even with all image 
processing features enabled. http://p.sf.net/sfu/kodak-com
_______________________________________________
Monetdb-developers mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/monetdb-developers

Reply via email to