Oracle FAQ Your Portal to the Oracle Knowledge Grid
HOME | ASK QUESTION | ADD INFO | SEARCH | E-MAIL US
 

Home -> Community -> Usenet -> c.d.o.misc -> Re: Encrypted Fields

Re: Encrypted Fields

From: Karsten Farrell <kfarrell_at_belgariad.com>
Date: Fri, 31 Jan 2003 01:08:42 GMT
Message-ID: <u0k_9.105$eR.16832833@newssvr15.news.prodigy.com>


Justin Cave wrote:

> Bigus Dickus <no_spam_for_me_thanks_at_yahoo.com> wrote in message news:<3E37E3B9.F8080DEE_at_yahoo.com>...
> 

>>For instance, we currently have a hashing algorithm which encrypts
>>passwords and then stores the hash in the password field of the user
>>table. However, the hash can be copied from user to user. For
>>instance, it is possible to create a dummy user, copy the admin's
>>password into the dummy user account, copy the password from your own
>>account into admin, et voila! you are able to login as admin with your
>>own password. Once you are done hacking away at the system, you simply
>>swap the passwords back and delete the dummy account record from the
>>table.
>>
>>It seems to me that there should be something within Oracle which would
>>prevent this.
> 
> 
> Generally, this problem is solved by salting the password with the
> username before it is hashed.  Thus, the user would know that their
> userid/password hashed to something, but would have no idea what
> admin/password would hash to.
> 
> Justin Cave

Also seed with the hostname so they can't load it on their PC at home and let it crank away with a password cracking program. Oracle doesn't do this, however. Received on Thu Jan 30 2003 - 19:08:42 CST

Original text of this message

HOME | ASK QUESTION | ADD INFO | SEARCH | E-MAIL US