![]() |
|
|
#12 | ||
|
Aug 2006
3×1,993 Posts |
Quote:
Quote:
Bad CA policies made it possible to do this stuff with only a collision attack instead of a second preimage attack. A collision attack against MD5 is roughly 2^63 ("millions of trillions") times easier than a (second) preimage attack. Last fiddled with by akruppa on 2009-06-23 at 20:54 Reason: s/harder/easier/ |
||
|
|
|
|
|
#13 |
|
Oct 2007
Manchester, UK
5·271 Posts |
Ah, I see, not quite as bad as I thought then, in that case I retract what I said.
I still wouldn't use MD5 though. Or SHA-1. |
|
|
|
|
|
#14 |
|
Aug 2006
3·1,993 Posts |
|
|
|
|
|
|
#15 |
|
Jul 2006
Calgary
52×17 Posts |
Ya, I'd say md5 would still probably be fine for GIMPS passwords. I can hardly even imagine anyone spending 3 days with 200 PS3s just to get a GIMPS password when there are so many other targets out there.
|
|
|
|
|
|
#16 |
|
Oct 2007
Manchester, UK
5×271 Posts |
But why bother? It would be no more effort to use a much more secure hash, why not use the absolute best available?
|
|
|
|
|
|
#17 |
|
Jun 2009
112 Posts |
Who cares how strong the digest is, it's still a really big secruity hole to pass passwords in plaintext. Espically in the url, as you can simply view someones history and obtain thier username and password for this site.
|
|
|
|
|
|
#18 | |
|
Aug 2002
223 Posts |
Quote:
It would need to be salted on each authentication request, which would require passing the salt over an encrypted channel, which sends you down the road of trying to protect the entire transmission over something like TLS, needing certificate generation and key exchanges, management of this infrastructure, and on and on. For what? This is GIMPS not a bank... Don't use the same login/password combination between sites. Change your password regularly if it worries you. Spend the cycles searching for primes, not multiplying a couple huge ones together to make a key pair... :) |
|
|
|
|
|
|
#19 | |
|
A Sunny Moo
Aug 2007
USA (GMT-5)
3·2,083 Posts |
Quote:
|
|
|
|
|
|
|
#20 | |
|
Aug 2002
223 Posts |
Quote:
|
|
|
|
|
|
|
#21 | |
|
A Sunny Moo
Aug 2007
USA (GMT-5)
3×2,083 Posts |
Quote:
|
|
|
|
|
|
|
#22 |
|
Account Deleted
"Tim Sorbera"
Aug 2006
San Antonio, TX USA
17×251 Posts |
I don't know about you, but it'd be easier for me to remember "Password" than "29f33cab54c2a8858885b95d8fbb7ff" if I happened to see it in the URL.
Is it secure against someone, say, snooping your network traffic? Absolutely not. They could use it directly in your GIMPS account and could probably reverse MD5 it to find your cleartext password. Does it provide a bit more security against someone happening to see your login info? Absolutely. It's something like replacing passwords with ***** as you type it in. |
|
|
|
![]() |
Similar Threads
|
||||
| Thread | Thread Starter | Forum | Replies | Last Post |
| Get username through public name? | UBR47K | PrimeNet | 0 | 2015-10-11 16:47 |
| I used the wrong username | dchmelik | Information & Answers | 0 | 2010-12-15 08:40 |
| Username fraud | 10metreh | Forum Feedback | 13 | 2010-09-10 12:28 |
| How to consolidate 2 Username? | stuymer | PrimeNet | 4 | 2004-02-29 21:33 |
| Many username mismatches between database and Primenet | GP2 | Data | 5 | 2003-09-24 21:15 |