Hi,
Can any body help me on finding out a best way:
I am planning to build an application on catalyst. I have 3 different module
1. Admin Utility.
2. Search Utility.
3. Index List Utility.
All modules have lots of jobs to perform.
My question is to create a separate catalyst app for each and p
Andrew Rodland writes:
> On Thursday 08 April 2010 08:12:24 pm Toby Corkindale wrote:
>> On 08/04/10 22:49, Daniel Pittman wrote:
>> > ...but your lost database *also* exposed user account/password pairs,
>> > which can now be tried against other services, since people usually use
>> > the same we
I already patched this with a fix, it is on github and I've linked to
it and posted it on rt. Janus told me he would give me maintenance to
post it on CPAN, and he hasn't followed through yet. It fixes the
problem by permitting you to pull in a non-static salt from the DB.
http://github.com/EvanCa
Gah, I posted the wrong URL.. If only we moved our mailing list to
AOL, I could undo the send.
http://github.com/EvanCarroll/Catalyst-Plugin-Authentication
Anyway, that's the repo -- Find the commits here:
http://github.com/EvanCarroll/Catalyst-Plugin-Authentication/commits/master
I'm not sure w
On Thursday 08 April 2010 08:12:24 pm Toby Corkindale wrote:
> On 08/04/10 22:49, Daniel Pittman wrote:
> > ...but your lost database *also* exposed user account/password pairs,
> > which can now be tried against other services, since people usually use
> > the same weak password and username all o
On 08/04/10 22:49, Daniel Pittman wrote:
Toby Corkindale writes:
On 08/04/10 16:21, Andrew Rodland wrote:
* In what circumstances was an attack possible?
ie. What combination of modules, options, auth methods.
* You use Catalyst::Authentication::Credential::Password.
* With the "ha
Toby Corkindale writes:
> On 08/04/10 16:21, Andrew Rodland wrote:
>>>* In what circumstances was an attack possible?
>>> ie. What combination of modules, options, auth methods.
>>
>> * You use Catalyst::Authentication::Credential::Password.
>> * With the "hashed" password_type.
>> * And
On 08/04/10 16:21, Andrew Rodland wrote:
* In what circumstances was an attack possible?
ie. What combination of modules, options, auth methods.
* You use Catalyst::Authentication::Credential::Password.
* With the "hashed" password_type.
* And your database is compromised.
I'd like to