Snitz Forums 2000
Snitz Forums 2000
Home | Profile | Register | Active Topics | Members | Search | FAQ
Username:
Password:
Save Password
Forgot your Password?

 All Forums
 Snitz Forums 2000 MOD-Group
 MOD Add-On Forum (W/Code)
 Password Salting - Updated 1-17-08
 New Topic  Reply to Topic
 Printer Friendly
Next Page
Author Previous Topic Topic Next Topic
Page: of 4

muzishun
Senior Member

United States
1079 Posts

Posted - 21 December 2007 :  10:52:28  Show Profile  Visit muzishun's Homepage  Reply with Quote
I am officially calling this a 1.0 release now. In the past month or so, there have been a couple dozen downloads of the MOD, and nobody has posted back yet with issues.

I'd like to get some other individuals to help me test this MOD. I've tested it once, but I want to ensure that everything works properly before I call it an official 1.0 release.

Password Salting
Version: 1.0
Author: Bill Parrott (muzishun)
Forum Version: Snitz Forum 2000 v3.4.06
Tested Databases: MS Access 2000
Last Updated: 1/17/08
Download Link: Chimeric Dream, SnitzBitz

(From Wikipedia) "In cryptography, a salt comprises random bits that are used as one of the inputs to a key derivation function. The other input is usually a password or passphrase. The output of the key derivation function is stored as the encrypted version of the password. A salt can also be used as a key in a cipher or other cryptographic algorithm. The key derivation function typically uses a hash function. Sometimes the initialization vector, a previously-generated value, is used as a salt."

This MOD helps make a site more secure by adding a randomly generated string to the end of users' passwords before they are encrypted. This ensures that even if someone gains access to the forum's database, even a brute force attempt to crack the passwords will be ineffective, due to the fact that a user's password cannot possibly be guessed (unless someone discovers the salt, of course).

Comments can be posted in this reply, but for support and bug reports, please visit the MOD Implementation forum here.<

Bill Parrott
Senior Web Programmer, University of Kansas
Co-Owner and Code Monkey, Eternal Second Designs (www.eternalsecond.com)
Personal Website (www.chimericdream.com)

Edited by - muzishun on 17 January 2008 11:15:58

AnonJr
Moderator

United States
5768 Posts

Posted - 21 December 2007 :  11:15:58  Show Profile  Visit AnonJr's Homepage  Reply with Quote
Will adding this MOD to a running site make existing passwords broken? While I understand the concept of salting the password, and while I agree that its a good thing, I don't want to make all my users re-enter their password so I can add this to an existing site... I'm not sure I'm going to get a good enough return for the effort.

Just thought I'd raise the issue. <
Go to Top of Page

muzishun
Senior Member

United States
1079 Posts

Posted - 21 December 2007 :  11:29:06  Show Profile  Visit muzishun's Homepage  Reply with Quote
Nope. I've got it coded so that when a user logs in, their password is checked both salted and unsalted. If the unsalted version matches the database, the DB is updated with the salted version of their password. This way, you should be able to install it seamlessly on a running forum.

Edit: This question already seems like it should be in the FAQ of the MOD readme. I have updated the zip files at both locations. I have a feeling that's a question a lot of people will want an answer to before they install the MOD.<

Bill Parrott
Senior Web Programmer, University of Kansas
Co-Owner and Code Monkey, Eternal Second Designs (www.eternalsecond.com)
Personal Website (www.chimericdream.com)

Edited by - muzishun on 21 December 2007 11:33:55
Go to Top of Page

MarcelG
Retired Support Moderator

Netherlands
2625 Posts

Posted - 22 December 2007 :  02:25:11  Show Profile  Visit MarcelG's Homepage  Reply with Quote
Great initiative Bill! Now we just need a security expert to validate this salting method to see if it really increases security.<

portfolio - linkshrinker - oxle - twitter
Go to Top of Page

phy1729
Average Member

USA
589 Posts

Posted - 22 December 2007 :  11:08:20  Show Profile  Reply with Quote
If you check both salted and unsalted password then the user effectively has two passwords. One is probably a mess of ASCII possibly unusable if it includes any chars <32 (non-printable chars) but keep that in mind. It would make a faster brute force and the attacker can find the unsalted password and still get in even if the password is salted. You may want to add a boolean value to the db that recordes if the password is salted or not, or even a int value to record the version if you need to change the algorithm.<
Go to Top of Page

muzishun
Senior Member

United States
1079 Posts

Posted - 22 December 2007 :  12:16:49  Show Profile  Visit muzishun's Homepage  Reply with Quote
The unsalted pass is only checked to see if the database has been updated yet. Basically, here's what happens:

1. The user tries to log in.
2. The forum salts their password and hashes it twice (once salted and once unsalted)
3. The forum checks the salted hash to see if it matches the hash in the database.
4. If yes, the user is logged in.
5. If no, the forum checks to see if the user's password in the database has been updated from the unsalted version
6. If the unsalted hash matches the db, the forum executes an UPDATE statement that puts the salted hash into the database in place of the unsalted one.

So basically, the unsalted password will no longer work after the user logs in once. And since the salt is not stored in the database, a hacker would have to actually gain access to your server to find out what it is, and at that point, you have bigger problems than database security.

Thanks for the comments! I have started having more time to work on some of the things I had going on in the background, so expect more stuff from me in the coming weeks/months. <

Bill Parrott
Senior Web Programmer, University of Kansas
Co-Owner and Code Monkey, Eternal Second Designs (www.eternalsecond.com)
Personal Website (www.chimericdream.com)

Edited by - muzishun on 22 December 2007 12:17:43
Go to Top of Page

modifichicci
Average Member

Italy
787 Posts

Posted - 22 December 2007 :  12:34:48  Show Profile  Visit modifichicci's Homepage  Reply with Quote
I cannot see properly your readme included, so i canot see changes..<

Ernia e Laparocele
Forum di Ernia e Laparocele
Acces - MySql Migration Tutorial
Adamantine forum
Go to Top of Page

muzishun
Senior Member

United States
1079 Posts

Posted - 22 December 2007 :  12:37:58  Show Profile  Visit muzishun's Homepage  Reply with Quote
What is happening to it? What browser are you opening it in?<

Bill Parrott
Senior Web Programmer, University of Kansas
Co-Owner and Code Monkey, Eternal Second Designs (www.eternalsecond.com)
Personal Website (www.chimericdream.com)
Go to Top of Page

modifichicci
Average Member

Italy
787 Posts

Posted - 22 December 2007 :  13:42:43  Show Profile  Visit modifichicci's Homepage  Reply with Quote
IE and FF
I see a white box in instructions..<

Ernia e Laparocele
Forum di Ernia e Laparocele
Acces - MySql Migration Tutorial
Adamantine forum
Go to Top of Page

modifichicci
Average Member

Italy
787 Posts

Posted - 22 December 2007 :  13:44:36  Show Profile  Visit modifichicci's Homepage  Reply with Quote
ok that is a very interesting thing and I need a cup of coffe.. sorry<

Ernia e Laparocele
Forum di Ernia e Laparocele
Acces - MySql Migration Tutorial
Adamantine forum
Go to Top of Page

muzishun
Senior Member

United States
1079 Posts

Posted - 22 December 2007 :  14:51:40  Show Profile  Visit muzishun's Homepage  Reply with Quote
No problem. You got it working, then?<

Bill Parrott
Senior Web Programmer, University of Kansas
Co-Owner and Code Monkey, Eternal Second Designs (www.eternalsecond.com)
Personal Website (www.chimericdream.com)
Go to Top of Page

modifichicci
Average Member

Italy
787 Posts

Posted - 22 December 2007 :  15:28:16  Show Profile  Visit modifichicci's Homepage  Reply with Quote
I will try it in next days, I would only take a look to changes required that are not so hard at a first look<

Ernia e Laparocele
Forum di Ernia e Laparocele
Acces - MySql Migration Tutorial
Adamantine forum
Go to Top of Page

muzishun
Senior Member

United States
1079 Posts

Posted - 17 January 2008 :  11:16:42  Show Profile  Visit muzishun's Homepage  Reply with Quote
Updated the initial post. I've upped the version from 0.5b to 1.0, since there haven't been any bug reports in the 30 or so times the MOD has been downloaded and (I'm assuming) installed.<

Bill Parrott
Senior Web Programmer, University of Kansas
Co-Owner and Code Monkey, Eternal Second Designs (www.eternalsecond.com)
Personal Website (www.chimericdream.com)
Go to Top of Page

HuwR
Forum Admin

United Kingdom
20584 Posts

Posted - 17 January 2008 :  12:21:13  Show Profile  Visit HuwR's Homepage  Reply with Quote
forgive my ignorance, but I fail to see how this increases the security, if I register and my password is password, when I log in my password will allways be password regardless of what you do to it, so a brute force attack will have exactly the same chance of cracking my password salted or not, it doesn't need to know what is stored in the db, that is irrelevant to a bruteforce attack<
Go to Top of Page

AnonJr
Moderator

United States
5768 Posts

Posted - 17 January 2008 :  12:36:36  Show Profile  Visit AnonJr's Homepage  Reply with Quote
Yeah, but with a salted password you can't run a rainbow table against a filched copy of the database.<
Go to Top of Page

HuwR
Forum Admin

United Kingdom
20584 Posts

Posted - 17 January 2008 :  13:01:07  Show Profile  Visit HuwR's Homepage  Reply with Quote
quote:
Originally posted by AnonJr

Yeah, but with a salted password you can't run a rainbow table against a filched copy of the database.


No, but a rainbow table is not technically a brute force attack either

simply using a decent password in the first place will prevent anyone cracking it <
Go to Top of Page
Page: of 4 Previous Topic Topic Next Topic  
Next Page
 New Topic  Reply to Topic
 Printer Friendly
Jump To:
Snitz Forums 2000 © 2000-2021 Snitz™ Communications Go To Top Of Page
This page was generated in 0.14 seconds. Powered By: Snitz Forums 2000 Version 3.4.07