Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-11 Thread Thomas Tomiczek
Jordan, while agreeing on everything, I consider the term "script kiddie" to be very usefull. It is usefull to decribe a certain type of attack: basically an automated attack by an uneducated user. It can be characterised by using a preprogrammed tool (the script) without any knowledge of what is

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-11 Thread Jordan Frank
to keep your mouth shut in the first place. Just my opinion though. - Original Message ----- From: "Thomas Tomiczek" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Friday, January 10, 2003 3:57 AM Subject: Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes IMHO there

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-11 Thread Thomas Tomiczek
nuary 10, 2003 4:45 PM > To: [EMAIL PROTECTED] > Subject: Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes > > > What I stated in my email was a simple way to provide some > advantage of a true salt along with some advantage of > simple-to-maintain code. Nothing is &quo

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-10 Thread Craft, Steve
Craft, Steve [mailto:[EMAIL PROTECTED]] >> Sent: Wednesday, January 08, 2003 7:08 PM >> To: [EMAIL PROTECTED] >> Subject: Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes >>[snip] You can read messages from the Advanced DOTNET archive, unsubscribe from Advanced DOTNET, or subscribe to other DevelopMentor lists at http://discuss.develop.com.

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-10 Thread Thomas Tomiczek
[EMAIL PROTECTED]] > Sent: Thursday, January 09, 2003 8:57 PM > To: [EMAIL PROTECTED] > Subject: Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes > > > Gosh, that's being a bit harsh. He already admitted that it's > not as secure as a random salt. While it's true

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-09 Thread Andrew Hopper
as when using a random salt, but he is correct in stating that it will slow down, if not keep out, script kiddies. -Andy Hopper - Original Message - From: "Thomas Tomiczek" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Thursday, January 09, 2003 3:08 AM S

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-09 Thread Thomas Tomiczek
) > -Original Message- > From: Craft, Steve [mailto:[EMAIL PROTECTED]] > Sent: Wednesday, January 08, 2003 7:08 PM > To: [EMAIL PROTECTED] > Subject: Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes > > > In the case of storing username/password in a database tabl

[ADVANCED-DOTNET] AW: [ADVANCED-DOTNET] AW: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-09 Thread Dominick Baier
-DOTNET] AW: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes > you should consider encrypting that fixed random salt with dpapi :) I have to assume you're joking. Right? You can read messages from the Advanced DOTNET archive, unsubscribe from Advanced DOTNET, or subscribe to other Devel

Re: [ADVANCED-DOTNET] AW: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-08 Thread Craig Andera
> you should consider encrypting that fixed random salt with dpapi :) I have to assume you're joking. Right? You can read messages from the Advanced DOTNET archive, unsubscribe from Advanced DOTNET, or subscribe to other DevelopMentor lists at http://discuss.develop.com.

[ADVANCED-DOTNET] AW: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-08 Thread Dominick Baier
] Betreff: Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes > That's not the most earth-shattering way of doing things, but > it should slow > down any script-kiddie that gets the password file; he will > have to append > the username to every password try on every different ta

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-08 Thread Craig Andera
> That's not the most earth-shattering way of doing things, but > it should slow > down any script-kiddie that gets the password file; he will > have to append > the username to every password try on every different table > row. It also > makes the salt different for each user, but is easier to

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-08 Thread Pinto, Ed
rom: Craig Andera [mailto:[EMAIL PROTECTED]] Sent: Wednesday, January 08, 2003 10:47 AM To: [EMAIL PROTECTED] Subject: Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes > > > But the > question was asking about salts, it wasn't asking for a > recommendation on > the ent

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-08 Thread Craft, Steve
In the case of storing username/password in a database table, I just use a "salt" of the username backwards and append that to the password before it gets encrypted and written to the password column. In normal app usage, the username is looked up and then the backwards username is appended to the

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-08 Thread Craig Andera
> > > But the > question was asking about salts, it wasn't asking for a > recommendation on > the entire authentication infrastructure. Even if it was, > there was not > enough information given about the application for anyone to > just say "use a > public key cryptosystem". Sounds like we w

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-07 Thread Jordan Frank
a public key cryptosystem". Jordan Frank eBusiness Applications www.ebusinessapplications.ca [EMAIL PROTECTED] - Original Message - From: "Craig Andera" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Tuesday, January 07, 2003 6:59 AM Subject: Re: [ADVANCED-DOTNET] Salt i

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-07 Thread Craig Andera
> Just one more question - > > > since the default random number generator blows. > > > I assume you are saying System.Random blows, not > System.Security.Cryptography.RandomNumberGenerator. > > Is this correct? Right. Although RandomNumberGenerator is just the abstract base. RNGCryptoService

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-07 Thread Pinto, Ed
PROTECTED]] Sent: Tuesday, January 07, 2003 8:46 AM To: [EMAIL PROTECTED] Subject: Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes The more I think about it, the more I come to realize that the salt should never leave the server. It adds nothing, and takes away something. It's whole purpose is to

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-07 Thread Craig Andera
Either I'm not understanding your strategy, or there are some problems with it. I'm not sure which is more likely. :) > You're right about the salt, it's basically to make it so the > same password > will not lead to the same hash, and also to prevent > pre-computed dictionary > attacks, where a

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-07 Thread Craig Andera
The more I think about it, the more I come to realize that the salt should never leave the server. It adds nothing, and takes away something. It's whole purpose is to make it somewhat harder to perform dictionary attacks against the password database. Transmitting it on the wire is just going to ma

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-06 Thread Jordan Frank
stems use them than use public-key cryptosystem schemes. All opinions stated in this email are my own and do not necessarily reflect those of my employer, or anyone else for that matter. - Original Message - From: "Pinto, Ed" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Se

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-06 Thread Pinto, Ed
bage" need to be shared, if so, how is this achieved? Cheers, Ed -Original Message- From: Craig Andera [mailto:[EMAIL PROTECTED]] Sent: Monday, January 06, 2003 2:44 PM To: [EMAIL PROTECTED] Subject: Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes Err, I think your protocol is sti

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-06 Thread Craig Andera
D]] > Sent: Monday, January 06, 2003 12:50 PM > To: [EMAIL PROTECTED] > Subject: Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes > > > Hey Craig, > Thanks for the reply. I guess I should have been more clear. > I agree that > channel encryption is important, howeve

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-06 Thread Adrian Bateman
On 06 January 2003 17:50, Pinto, Ed wrote: > I guess I'm somewhat confused about two commonly used terms - salt and > nonce. What you refer to as "random salt" I've always thought as a nonce > ("number used once"). To me, the term salt has always represented a > randomly generated, but persisted

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-06 Thread Pinto, Ed
Hey Craig, Thanks for the reply. I guess I should have been more clear. I agree that channel encryption is important, however, my question is about the security protocol, not about the channel. I guess I'm somewhat confused about two commonly used terms - salt and nonce. What you refer to as "r

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-06 Thread Adrian Bateman
Also see HTTP digest authentication in RFC 2617 [1] which discusses the appropriate security issues and includes a C sample implementation. Unfortunately, you will suffer from dictionary attacks unless you use asymmetric keys or shared secrets but maintaining those is an overhead you might not wish

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-06 Thread Craig Andera
> There is a thread in the old DotNet archive that talks about > how to protect against replay attacks without using SSL. I > believe it has to do with the client requesting a token from > the server, then hashing the token with the password and > passing that to the sever on a second trip. I

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-06 Thread Thomas Tomiczek
Tomiczek THONA Consulting Ltd. (Microsoft MVP C#/.NET) > -Original Message- > From: Franklin Gray [mailto:[EMAIL PROTECTED]] > Sent: Monday, January 06, 2003 6:01 PM > To: [EMAIL PROTECTED] > Subject: Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes > > > Ther

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-06 Thread Franklin Gray
. -Original Message- From: Craig Andera [mailto:[EMAIL PROTECTED]] Sent: Monday, January 06, 2003 10:08 AM To: [EMAIL PROTECTED] Subject: Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes > Can someone help me understand the usage of a salt in > PasswordDeriveBytes? > I think I understand, b

Re: [ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-06 Thread Craig Andera
> Can someone help me understand the usage of a salt in > PasswordDeriveBytes? > I think I understand, but I want confirmation. Right now, I > create a salt > for each user when the user is created. I use > PasswordDeriveBytes to create > a userkey based on a password and the salt. Then I sto

[ADVANCED-DOTNET] Salt in PasswordDeriveBytes

2003-01-02 Thread Pinto, Ed
Can someone help me understand the usage of a salt in PasswordDeriveBytes? I think I understand, but I want confirmation. Right now, I create a salt for each user when the user is created. I use PasswordDeriveBytes to create a userkey based on a password and the salt. Then I store the userkey an