On Mon, 2008-01-21 at 14:37 -0500, Mike Potter wrote:
>
> You should have said "yes" and quit while you thought you were ahead.

I'm not trying to get "ahead"... I didn't know I was competing. Are we
competing? I thought I was just answering posts.

> > that was me saying that there is certainly a good reason to use a
> > user defined salt-- legacy compatibility. The random salt is useless
> > if you need to create a crypt()'d string that will match the crypt()'d
> > string created by a C program 10 years ago--
> 
> Given that the scenario is a cracker who has your user/pass ID table, that
> was never a stated goal, purpose or anything.
> 
> > and so in this context,
> 
> Okay, you win. I can't provide enough real world data to illustrate
> exactly how wrong you are, in your view because, in your view all
> this real world data does not get parsed properly.

???

> Myself and this is what you were talking around but wouldn't embrace,
> I think the $salt and encryption method both count for a lot. Given
> the same encryption method, why would a user-supplied $salt necessarily
> be better than a random $salt? Answer that only, if you can and expect
> a reply.

I never said it would. I didn't even come close to saying a user defined
salt would be better than a random salt given that the encryption method
is the same. From what hat did you pull that?

I merely indicated reasons why the user defined salt was necessary.

Cheers,
Rob.
-- 
...........................................................
SwarmBuy.com - http://www.swarmbuy.com

    Leveraging the buying power of the masses!
...........................................................

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to