Since PBKDF2 can be salted, it would be impossible to compare my hash against Mystic's hash. Also, I notice the hash is not the full length in the users.dat file so I assume it's truncated.
Is there a way we could do a "mystic -uUSERNAME -pPASS -verify" type command with a return value that suggests whether the validation is successful?
Yeah maybe we can do something like that. I am hesitant to allow a password in cleartext on the command line though and I'd be interested
in what other people think about allowing that.
Its a full 512-bit hash, its just stored as binary. Its also salted as you mentioned.
Yeah maybe we can do something like that. I am hesitant to allow a password in cleartext on the command line though and I'd be interested
in what other people think about allowing that.
Yeah maybe we can do something like that. I am hesitant to allow a password in cleartext on the command line though and I'd be intereste in what other people think about allowing that.
I'd be strongly in favor of making the password entry interactive so it doesn't get saved into bash history in cleartext :)
But then thinking about it, telnet itself is cleartext and unencrypted
so I guess that supersedes putting too much thought into it! :)
I'd be strongly in favor of making the password entry interactive so it doesn't get saved into bash history in cleartext :)
Do you mean using something like AES256 (or any two way encryption) instead of a password hash? Or do you mean expose how the password is hashed and stored so that someone else can calculate the hash and
compare it?
True, but if you really wanted to lock down a BBS, Mystic does allow for it.
Yes, these features are great. One thing I'd like with this discussion on passwords it to allow for some way to validate a user's credentials via Mystic's users.dat as a tie-in to my website. I'm all for making them download things from the BBS, but I also like integrating new
technologies with the experience.
I have thought about this a bit before I redid the passwords. One of
the ideas that I came up with was that I could make a REST server that
has a function where you could POST to it and get a true/false response
to validate the password.
Anyway, the way I imagined it was that the website would post a SHA512 hash of the password to the service (so no cleartext is passed and we're not relying only on SSL to guard the data). Mystic would take that
SHA512 hash and salt it and put it through its PBKDF2 process in order
to figure if its legit and then return the true/false response. So basically the first iteration is done on the webapp and sent over, then confirmed by the REST service.
Sysop: | Kurt Weiske |
---|---|
Location: | Aptos, CA |
Users: | 157 |
Nodes: | 6 (0 / 6) |
Uptime: | 24:24:51 |
Calls: | 9,928 |
Calls today: | 3 |
Files: | 12,140 |
D/L today: |
1 files (7K bytes) |
Messages: | 138,834 |