[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: crypt



Rick Jones <rickya@siservices.net> writes:

> This is completely false.  I don't care what is done to a password.  If it
> is constant and repeatable, as password's need to be, then it's only a
> matter of time.  If the method is public knowledge as with the source code
> to encrypt passwords, it can be decrypted in no time.

What if two passwords hash to the same value?  How is it possible to
do a reverse lookup on that hash?  Yet, you can still verify that the
password a user is attempting log in with hashed to the same thing it
did when they ran "passwd".  

Now, if you can generate ONE of the passwords that hashes to a
particular value, then I guess you're in business anyways, but you
still didn't necessarily get the same password back.

Later,
	Dale

-- 
+--------------------  finger for pgp public key  ---------------------+
| Dale E. Martin | University of Cincinnati Savant Research Laboratory |
| dmartin@ececs.uc.edu    |     http://www.ececs.uc.edu/~dmartin       |
+----------------------------------------------------------------------+


--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
debian-user-request@lists.debian.org . 
Trouble?  e-mail to templin@bucknell.edu .


Reply to: