in reply to Re^3: encrypt passwords
in thread encrypt passwords
A lovely sentiment, but it's a bit rose-colored. The statement only applies in a perfect world,
That's garbage! Passwords do not need to be decrypted. Ever!
You encrypt the password with a one-way hash and only store the hash.
To verify: you accept the password from the user; encrypt it using the same one-way hash and compare the result against the stored, encrypted value. If they match; he's authorised.
The password is never stored in any form that can be decrypted; and can only be discovered by encrypting every possibility and comparing them with the stored, encrypted result.
That has been the simple, correct way to do things since forever.
If you are handed a system where thousands of access routines managed by hundreds of non-IT folks are being used, the task of converting their access to more modernized and secure authentication techniques may not be permissible. Under those circumstances, obfuscation may be your only hope (Obi-wan).While I generally agree that the only thing worse than bad security is fake security, there are times when that's the only tool left in the toolbox.
More utter twaddle. No wonder the web leaks like a sieve when the obvious is ignored by so many "experts".
I can already hear sundialsvc4's skin crinkling as he cringes at all the things that will go wrong in the future when such a decision is made -- and he's right.
sundialsvc4 is a joke of a programmer; and you'll do yourself no good by hitching your skirts to his wagon train.
|
---|
Replies are listed 'Best First'. | |
---|---|
Re^5: encrypt passwords
by marinersk (Priest) on Apr 17, 2015 at 18:17 UTC | |
by BrowserUk (Patriarch) on Apr 17, 2015 at 20:46 UTC | |
by marinersk (Priest) on Apr 17, 2015 at 22:13 UTC | |
by BrowserUk (Patriarch) on Apr 17, 2015 at 23:18 UTC | |
by marinersk (Priest) on Apr 18, 2015 at 01:43 UTC | |
|