Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today!

If you have any problems with the registration process or your account login, please contact us.

Post New Thread Reply

Register GFY Rules Calendar Mark Forums Read
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed.

 
Thread Tools
Old 01-25-2004, 06:06 PM   #1
Libertine
sex dwarf
 
Libertine's Avatar
 
Join Date: May 2002
Posts: 17,860
How important is security on your website scripts to you?

Do you mind if the password for the admin areas of your scripts is sent to the server in plaintext or would you prefer something where, for instance, the server sends you a random string when you login, which is combined with the password you enter for a hahahahahahahahahaha md5-hash of the combination of both, which is then checked against a serverside md5-hash of both? (in other words, your password isn't sent in plaintext, which gives more security)
__________________
/(bb|[^b]{2})/
Libertine is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 01-26-2004, 07:53 AM   #2
Libertine
sex dwarf
 
Libertine's Avatar
 
Join Date: May 2002
Posts: 17,860
I take it this means you people don't care?
__________________
/(bb|[^b]{2})/
Libertine is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 01-26-2004, 08:01 AM   #3
Libertine
sex dwarf
 
Libertine's Avatar
 
Join Date: May 2002
Posts: 17,860
hahahahahaha = javascript by the way
__________________
/(bb|[^b]{2})/
Libertine is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 01-26-2004, 08:03 AM   #4
Hue G. Pness
Confirmed User
 
Join Date: Jun 2003
Location: Variable
Posts: 1,237
Well I think most users would prefer a script as secure as possible for passwords etc. So md5-hash while not bullet proof certainly cant hurt and I would think is much better than just launching the password in plain text.
__________________
GFY Voice of Reason
Hue G. Pness is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 01-26-2004, 08:14 AM   #5
Libertine
sex dwarf
 
Libertine's Avatar
 
Join Date: May 2002
Posts: 17,860
Quote:
Originally posted by Hue G. Pness
Well I think most users would prefer a script as secure as possible for passwords etc. So md5-hash while not bullet proof certainly cant hurt and I would think is much better than just launching the password in plain text.
Fairly close to bulletproof, actually.

What happens is the following (severely simplified):

A person wants to login
The server registers a session, containing the session id, the ip address of the user, the random variable which is used in the hash and the md5 hash of the password/variable (and other stuff like time of death etc)
The user gets the random variable, which is used with the password for the generation of the md5 hash... uses JS, so the server doesn't have to do anything
The md5 hash is verified against the md5 hash, user gets the md5 hash and the session id in a cookie

Not bulletproof, and not as good as using ssl, but a hacker needs the session id, the md5 hash and the user's ip to get in. Also, the whole thing dies as soon as the user logs out or the session expires. So, he needs to do a bunch of stuff and is in a big hurry... and there is nothing he can do against the login stuff dying quickly
__________________
/(bb|[^b]{2})/
Libertine is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 01-26-2004, 08:22 AM   #6
Libertine
sex dwarf
 
Libertine's Avatar
 
Join Date: May 2002
Posts: 17,860
Here I am, all excited by introducing a new security standard for the scripts which control our income, and nobody is interested... *sigh*
__________________
/(bb|[^b]{2})/
Libertine is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 01-26-2004, 08:55 AM   #7
Trax
[----------------------]
 
Join Date: Aug 2001
Posts: 14,486
on small, custom scripts i dont give a shit
toooo unimportant to pay extra cash for security
Trax is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 01-26-2004, 09:02 AM   #8
Libertine
sex dwarf
 
Libertine's Avatar
 
Join Date: May 2002
Posts: 17,860
Quote:
Originally posted by Trax
on small, custom scripts i dont give a shit
toooo unimportant to pay extra cash for security
This is for a bunch of scripts that will all be open source and free to use. Stuff like tradescripts, toplist scripts, gallery scripts, tgp scripts, ad scripts... the sort of stuff that controls your traffic.
__________________
/(bb|[^b]{2})/
Libertine is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 01-26-2004, 10:00 AM   #9
Libertine
sex dwarf
 
Libertine's Avatar
 
Join Date: May 2002
Posts: 17,860
Note to programmers who want to implement something like this: Since nothing residing on the server should give a hacker enough info to login, you'll actually have to use a triple md5 for the value in the session database.

Here's a quick overview of the protocol:

x = the password submitted by the user
y = the random variable
the server has md5(z) stored in the passwords database table, where z is the real password

(1) user requests login page
(2) server creates a random variable, y
- server saves md5(md5(md5(z) + y))
- server sends y to the user
(3) user enters password, x, and receives the random variable, y
- user calculates md5(md5(x) + y)
(4) user sends the result of md5(md5(x) + y)
(5) server receives the result of md5(md5(x) + y)
- server calculates md5(md5(md5(x) + y))
- server compares the result of md5(md5(md5(x) + y)) to the saved result of md5(md5(md5(z) + y))

There is still the danger of eavesdropping, but that will only reveal the result of md5(md5(x) + y), not x. It will be valid for a short while (although the ip is ofcourse also saved and checked), but when it dies a hacker will lose access.
And, like with standard protection, the database being compromised will not mean a hacker gets any useful login info... unless ofcourse the hacker gets write access, but then you're screwed anyway.
__________________
/(bb|[^b]{2})/
Libertine is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Post New Thread Reply
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >

Bookmarks
Thread Tools



Advertising inquiries - marketing at gfy dot com

Contact Admin - Advertise - GFY Rules - Top

©2000-, AI Media Network Inc



Powered by vBulletin
Copyright © 2000- Jelsoft Enterprises Limited.