security - Where do I salt and hash my Passwords? At the client or at the host? -
i think smarter salt , hash passwords directly on client's machine. reason is, never want password of user. string should secret him, not both of us. argued, want keep salt secret, can not send in clear text on channel. apparently, not case. don't see reason, why shouldn't request hash client side. think?
edit discuss issue of sending clients password host not directly issue. issue client send password out of computer @ all. optimistic client may assume computer save territory. going out of cable (or antenna) eve's territory. can never too paranoid in security scenario. again: password should never leave clients computer!
sending either passphrase or hash lets attacker record hash , use in replay attack.
you want use challenge/response protocol, means send out random number. client encrypts (or keyed hash on) random number using hash of passphrase key, , sends result. same, , see of 2 match.
this lets verify matching keys without every sending key across insecure channel.
as how data able comparison, yes, want client hash passphrase, encrypt server's public key, , send result of encryption.
Comments
Post a Comment