in reply to Re: Re: Re: MySQL Status Tool
in thread MySQL Status Tool

Feature creep might happen, but I add in -w, -T, and -Mstrict as a habit anyways. I will add it if you really want, though. :)<br.
Any sniffer could also detect the salt used for encryption, so it's unavoidable.

With a quick edit, you can hardcode in the mysql password in the file. Just change the line like:
my $rootpwd = $q->param('rootpwd');
to
my $rootpwd = 'ilikeapples';.

-qslack, posting as anon because I am not at my computer and I forgot my password :)

Replies are listed 'Best First'.
Re: Re: Re: Re: Re: MySQL Status Tool
by mr_mischief (Monsignor) on Apr 16, 2002 at 19:31 UTC
    Seeing the salt of a 3DES or MD5 encrypted password hash isn't enough to make it nearly as easy to read as plaintext. The sniffer would know the encrypted password that one time, but they'd still have to actually crack it in order to use it in the future, or sniff the newly encrypted one next time too, and beat you to submitting the data back to the server. You could also make sure the server only accepts the password encrypted with that salt from the IP to which it sent that salt...

    In other words, don't dismiss advice out of hand without considering that it might actually be good advice.
      Playing tricks like that will only get crackers excited. You don't want to excite the crackers. Better to just stick it on an SSL server and hope for the best!

      -sam