> -----Message d'origine----- > De : Haydar Tuna [mailto:haydartuna@xxxxxxxxxx] > Envoyé : mardi 20 février 2007 10:34 > À : php-general@xxxxxxxxxxxxx > Objet : Re: Securing user table with sha function > > Hello again, > if you crypt your usernames, it happened many problems. > As you know, if you crypt any string to SHA1, you don't > decrypt again. You cannot use username in your application. > in my many application, I have crpyted password , I haven't > cryrpt usernames. Becuase I used username for session > authentication. for example if I want to action on the > usernames or list of usernames , what can I do this? All of > usernames are crypted. OK then what if i consider using PHP's Mcrypt extension with a key to crypt/decrypt data, this would give me the possiblity to use a username crypted hash in the session variable and decrypt it at any moment with the proper key? > Haydar TUNA > Republic Of Turkey - Ministry of National Education Education > Technology Department Ankara / TURKEY > Web: http://www.haydartuna.net > > ""Haydar Tuna"" <haydartuna@xxxxxxxxxx> wrote in message > news:F3.78.01477.FAD49D54@xxxxxxxxxxxxxxx > > Hello, > > > > 1) If you protect your site from SQL Injection, you must > replace all > > quote and blank character in your form data. (with string functions) > > 2) After this step, you can compare your password (with SHA1) and > > database password field (with SHA1). > > 3) if comparing passwords are true, then you must use session > > variables for username > > 4) if user forget his or her password, you can send email > to the user > > when the user answer password protected question. > > > > > > -- > > Haydar TUNA > > Republic Of Turkey - Ministry of National Education Education > > Technology Department Ankara / TURKEY > > Web: http://www.haydartuna.net > > > > ""Tim"" <user@xxxxxxxxxxxxx> wrote in message > > news:001c01c75280$b81abcc0$1700a8c0@xxxxxxxxxxxxxxxxx > >> Hello, > >> > >> Now moving on into other aspects of security :P I was > thinking of a > >> way to secure my login inputs the best way possible. > >> Seeing how many different types of injection attacks their is and > >> while observing different authentication systems I often > notice the > >> sha() function being used for passwords, which of course is the > >> minimum requirements to saving passwords but.. Why manipulate this > >> information in clear text wether it be email or username or pass > >> fields, such as when you use sessions/cookies, or any > other method of > >> passing authentication information from page to page (an > sha hash is > >> x times less "geussable" then any other human term)... AND how to > >> secure for injection attacks? > >> > >> Now this is where i thought hey, on every login page there > is a user > >> and pass input field and thus this is the only place one > could "peak" > >> into my user table, and I don't want someone injecting > through their > >> as the user table (three fields seperate from profile, username, > >> email, pass) is the key to entry to the site.. SO, why not just > >> encrypt all three fields? And store "copies" of email and username > >> (not pass :P) in another database unecrypted or with a salt for > >> further recovery.. > >> > >> This would ensure that ANY information entered into the user and > >> passowrd will be run through sha() thus creating a 40 char length > >> hash and covering any (?) injection possiblity through a > forged input > >> in one of those fields via my "select" routine.. > >> > >> Just wondering what other security conscious people think > of this "plan" > >> even though it may slow down logins a tad but the tight > security in > >> my opinion justifies this.. > >> > >> Does anyone see an ugly flaw in this scheme? > >> Does it look viable? > >> > >> Thanks for any input, > >> > >> Regards, > >> > >> Tim > > -- > PHP General Mailing List (http://www.php.net/) To > unsubscribe, visit: http://www.php.net/unsub.php > -- PHP General Mailing List (http://www.php.net/) To unsubscribe, visit: http://www.php.net/unsub.php