[Date Prev][Date Next] [Chronological] [Thread] [Top]

RE: RFC2256: userPassword




> -----Original Message-----
> From: Kurt D. Zeilenga [mailto:Kurt@OpenLDAP.Org]
> Sent: Tuesday, June 29, 1999 2:29 PM
> To: Howard Chu
> Cc: Robert Allen; mcs@netscape.com; Paul Leach;
> gomez@lhola.engr.sgi.com; ietf-ldapext@netscape.com
> Subject: RE: RFC2256: userPassword
> 
> 
> At 02:07 PM 6/29/99 -0700, Howard Chu wrote:
> >How do you store the key that's used to encrypt
> >the userPassword?
> 
> When using one-way hash algorithms, you don't decrypt.
> The server only needs to record the value of the hash and the salt
> (if used).
> 
> 	if Hash(password, Salt(userPassword)) equals userPassword
> 		approve
> 	else
> 		disapprove
> 
> where password is the password supplied with the bind operation,
> userPassword is the recorded "encrypted" value, and Salt() extracts
> the salt from the recorded value, and Hash generates an "encrypted"
> value (with embedded salt).

And I'll say again -- this is not secure enough for today's world. If the
above Hash is very fast, then it is easy to test trillions of candidate
passwords against the stored userPassword attribute.

Paul