Click here to Skip to main content
15,887,135 members

The Insider News

   

The Insider News is for breaking IT and Software development news. Post your news, your alerts and your inside scoops. This is an IT news-only forum - all off-topic, non-news posts will be removed. If you wish to ask a programming question please post it here.

Get The Daily Insider direct to your mailbox every day. Subscribe now!

 
GeneralRe: Salted Password Hashing - Doing it Right Pin
NormDroid25-Oct-12 20:37
professionalNormDroid25-Oct-12 20:37 
GeneralRe: Salted Password Hashing - Doing it Right Pin
TheGreatAndPowerfulOz26-Oct-12 5:49
TheGreatAndPowerfulOz26-Oct-12 5:49 
GeneralRe: Salted Password Hashing - Doing it Right Pin
wout de zeeuw27-Oct-12 3:37
wout de zeeuw27-Oct-12 3:37 
GeneralRe: Salted Password Hashing - Doing it Right Pin
TheGreatAndPowerfulOz27-Oct-12 4:25
TheGreatAndPowerfulOz27-Oct-12 4:25 
GeneralRe: Salted Password Hashing - Doing it Right Pin
wout de zeeuw27-Oct-12 4:32
wout de zeeuw27-Oct-12 4:32 
GeneralRe: Salted Password Hashing - Doing it Right Pin
Marco Miltenburg28-Oct-12 20:54
Marco Miltenburg28-Oct-12 20:54 
GeneralRe: Salted Password Hashing - Doing it Right Pin
wout de zeeuw29-Oct-12 0:28
wout de zeeuw29-Oct-12 0:28 
GeneralRe: Salted Password Hashing - Doing it Right Pin
Schmuli29-Oct-12 8:20
Schmuli29-Oct-12 8:20 
The following is the response I received from the article's author, after asking the same question via email:

----- Start Email Response -----

Hi,

Here's a copy-pasted email I just sent someone who asked a related question:

------
Even if you are hashing the password on the client side, you still have
to hash on the server. Because if you just hash in the browser, then the
hash "becomes" the password in the sense that the hash value is all an
attacker needs to get in to someone's account. If a bad guy hacks into
the database storing all of these values, then he'll have immediate
access to every account.

So regardless of what you do in the browser, you still need to hash on
the server.

[ the original sender was worried that looking up the salts would let an
attacker test if usernames are valid without knowing the password ]

Anyway, if you do hash on the client side too, you're right that you
really don't want to let an attacker test if usernames are valid. Since
you're still hashing on the server with a random per-user salt, it's OK
to sacrifice randomness for the client-side salts. I recommend combining...

1. The username.
2. A website-specific string (e.g. the domain name).

...to make the client-side salt. It's not guaranteed to be unique (e.g.
domain changes ownership), but it's very likely to be. It's good enough.

Another thing to consider is that not all users have JavaScript enabled
in their browser (I don't), so whatever you do, the system should fall
back to emulating the JavaScript hashing on the server if the user isn't
running scripts in their browser.
-----

I'll add this to the FAQ or to the main article since it's very
important to get right!

Thanks!
havoc

----- End Email Response -----
GeneralRe: Salted Password Hashing - Doing it Right Pin
TheGreatAndPowerfulOz29-Oct-12 8:37
TheGreatAndPowerfulOz29-Oct-12 8:37 
GeneralRe: Salted Password Hashing - Doing it Right Pin
Taylor Hornby30-Oct-12 9:09
Taylor Hornby30-Oct-12 9:09 
GeneralRe: Salted Password Hashing - Doing it Right Pin
fickendichdu29-Oct-12 9:59
fickendichdu29-Oct-12 9:59 
GeneralRe: Salted Password Hashing - Doing it Right Pin
bpfh29-Oct-12 10:25
bpfh29-Oct-12 10:25 
GeneralRe: Salted Password Hashing - Doing it Right Pin
ThatEffinIanHarrisBloke29-Oct-12 20:14
ThatEffinIanHarrisBloke29-Oct-12 20:14 
GeneralRe: Salted Password Hashing - Doing it Right Pin
bpfh30-Oct-12 10:28
bpfh30-Oct-12 10:28 
GeneralRe: Salted Password Hashing - Doing it Right Pin
ThatEffinIanHarrisBloke30-Oct-12 15:39
ThatEffinIanHarrisBloke30-Oct-12 15:39 
NewsWhy Coding Style Matters Pin
Terrence Dorsey25-Oct-12 11:03
sitebuilderTerrence Dorsey25-Oct-12 11:03 
GeneralRe: Why Coding Style Matters Pin
Andrew Torrance28-Oct-12 13:54
Andrew Torrance28-Oct-12 13:54 
NewsSSH key and passwordless login basics for developers Pin
Terrence Dorsey25-Oct-12 11:02
sitebuilderTerrence Dorsey25-Oct-12 11:02 
NewsRob Pike - 'Concurrency Is Not Parallelism' [video] Pin
Terrence Dorsey25-Oct-12 11:02
sitebuilderTerrence Dorsey25-Oct-12 11:02 
NewsTypescript - a real world story of adoption in TFS Pin
Terrence Dorsey25-Oct-12 11:02
sitebuilderTerrence Dorsey25-Oct-12 11:02 
GeneralRe: Typescript - a real world story of adoption in TFS Pin
Ravi Bhavnani25-Oct-12 11:25
professionalRavi Bhavnani25-Oct-12 11:25 
NewsThe future of .NET lies in Mono. The future of F# lies in MonoDevelop. Pin
Terrence Dorsey25-Oct-12 11:01
sitebuilderTerrence Dorsey25-Oct-12 11:01 
GeneralRe: The future of .NET lies in Mono. The future of F# lies in MonoDevelop. Pin
Marc Clifton25-Oct-12 11:58
mvaMarc Clifton25-Oct-12 11:58 
GeneralRe: The future of .NET lies in Mono. The future of F# lies in MonoDevelop. Pin
devvvy25-Oct-12 15:02
devvvy25-Oct-12 15:02 
GeneralRe: The future of .NET lies in Mono. The future of F# lies in MonoDevelop. Pin
Jörgen Andersson25-Oct-12 20:29
professionalJörgen Andersson25-Oct-12 20:29 

General General    News News    Suggestion Suggestion    Question Question    Bug Bug    Answer Answer    Joke Joke    Praise Praise    Rant Rant    Admin Admin   

Use Ctrl+Left/Right to switch messages, Ctrl+Up/Down to switch threads, Ctrl+Shift+Left/Right to switch pages.