On Thursday 22 November 2001 13:40, Mike Orr wrote:
> On Thu, Nov 22, 2001 at 11:26:59AM -0800, Tavis Rudd wrote:
> > > >* How are password's stored internally? plain or hashed?
> > >
> > > They should absolutely *not* be stored as plain (clear?) text.
>
> Sorry, but that *is* a knee-jerk reaction.  There are tradeoffs
> both ways, and it should be the app developer's/local
> administrator's choice. If passwords are hashed, it's impossible
> have an "I forgot my password; mail it to me" screen, because the
> program cannot unhash the password. You can say, "Oooh, that's
> unacceptable," but it all depends on what the password grants
> access to.  If it's to my bank account, it better be hasned and
> behind 128-bit https: .  But if it's just to post to a forum or
> edit an online profile/resume, maybe it doesn't matter that much
> and it's more important to provide convenience instead.  Because
> forcing ppl to change passwords to something they didn't choose
> runs another risk: that they'll forget the password again.

There's ways around this that don't require storage of passwords in 
clear text.  For example, a fall-back challenge question can be used 
in combination with an email address.  The user forgets their 
password, clicks 'send me a reminder', the server sends an email 
with a randomized URI the user can go to for the next 30 minutes and 
change their password.  Once they go to the URI they must answer the 
challenge question correctly before changing their password.  The 
response to the challenge question would also be hashed.  The 
password change would only truly be secure if it was encrypted via 
SSL, but you could use the javascript implementation md5 to send a 
hash of the new password instead of clear text when SSL is not 
available.

_______________________________________________
Webware-discuss mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/webware-discuss

Reply via email to