in reply to Re: Too Convenient Security?
in thread Too Convenient Security?
I'm seeing now the dangers of a static salt, but I'm still wondering if it's too much trouble to keep the salt and password separate. Also, I should mention that even if a cracker grabs my salt (crackers grabbing salt?), that still doesn't grant them access to the database with the password hashes. Alternatively, getting access to the database doesn't give them access to the salt. That would seem more secure than the random salt.
Of course, since I was using a simple digest, this is much easier to crack than the Crypt::PasswdMD5, so a bruteforce is more feasible, though it's still going to be difficult).
So, are there any systems which have distinct salts for each password and keeps the salts separate? Would this be a good or bad idea?
Cheers,
Ovid
Join the Perlmonks Setiathome Group or just click on the the link and check out our stats.
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re: (Ovid) (2): Too Convenient Security?
by n3dst4 (Scribe) on Jan 07, 2002 at 22:39 UTC | |
by jreades (Friar) on Jan 08, 2002 at 04:14 UTC |