Re: How are you authenticating you applications?

From: Greg Rahn <greg_at_structureddata.org>
Date: Wed, 9 Mar 2011 15:03:02 -0800
Message-ID: <AANLkTi=7ArZ91_2GDKJ6Lv7ia26P+m+zT59Hvuc7gHOr_at_mail.gmail.com>



On Wed, Mar 9, 2011 at 11:11 AM, Guillermo Alan Bort <cicciuxdba_at_gmail.com> wrote:
>    We are working on providing the hashed password, so all the non-dbas get
> is a hash... but I don't know how strong the eencryption really is... and
> I'd like to let my i7 have a go at cracking one and see how long it takes...
> still, a non-human-intervention approach would be appreciated :-)

I'm not sure what you mean by this but I would strongly suggest this as a starting point:
http://codahale.com/how-to-safely-store-a-password/

BTW, an i7 is nothing... just spend a week or so to learn Nvidia CUDA, rent a few dozen Amazon Web Services Cluster GPU instances and you will be frightened to learn how many hundreds of billions of password candidates (yes billions!) you can try in a few seconds. All at the hands of anyone with an AWS account. Makes you think at least twice about password security.

-- 
Regards,
Greg Rahn
http://structureddata.org
--
http://www.freelists.org/webpage/oracle-l
Received on Wed Mar 09 2011 - 17:03:02 CST

Original text of this message