Trac is being migrated to new services! Issues can be found in our new YouTrack instance and WIKI pages can be found on our website.

Changes between Version 17 and Version 18 of PlainTextPasswords


Ignore:
Timestamp:
Feb 28, 2014, 9:11:31 AM (10 years ago)
Author:
fedor.brunner
Comment:

changing links to HTTPS

Legend:

Unmodified
Added
Removed
Modified
  • PlainTextPasswords

    v17 v18  
    1818== "But other programs don't store my password in plain text!" ==
    1919
    20 That's true. But few of them store it in a way that's any safer. A Google search for [http://www.google.com/search?q=im+passwords "im passwords"] shows a bunch of hits for getting the passwords out of other IM clients just as easily as Pidgin.
     20That's true. But few of them store it in a way that's any safer. A Google search for [https://www.google.com/search?q=im+passwords "im passwords"] shows a bunch of hits for getting the passwords out of other IM clients just as easily as Pidgin.
    2121
    2222The very first link is a clear indication that '''''__none__''''' of these IM applications provide any sort of real password security:
     
    108108== DIGEST-MD5 in Jabber/XMPP ==
    109109
    110 [http://www.xmpp.org/rfcs/rfc3920.html#security-mandatory RFC 3920] requires that Jabber/XMPP servers implement SASL DIGEST‑MD5 authentication method. This allows clients (and servers) to not store the password in plain-text but instead store cryptographic hash (MD5) of user name, domain and password. If the password is strong this makes nearly impossible for an attacker to recover the password.
     110[https://xmpp.org/rfcs/rfc3920.html#security-mandatory RFC 3920] requires that Jabber/XMPP servers implement SASL DIGEST‑MD5 authentication method. This allows clients (and servers) to not store the password in plain-text but instead store cryptographic hash (MD5) of user name, domain and password. If the password is strong this makes nearly impossible for an attacker to recover the password.
    111111
    112112Following downsides remain:
     
    117117Currently (as of 2008) Pidgin does not store the hash. elb: "I would accept a good patch to implement that"
    118118
    119 As of 2010, the draft version of the next XMPP standard specifies [http://tools.ietf.org/html/rfc5802 SCRAM-SHA-1] as the mandatory-to-implement mechanism, replacing DIGEST-MD5, though not all servers support it currently.
     119As of 2010, the draft version of the next XMPP standard specifies [https://tools.ietf.org/html/rfc5802 SCRAM-SHA-1] as the mandatory-to-implement mechanism, replacing DIGEST-MD5, though not all servers support it currently.
All information, including names and email addresses, entered onto this website or sent to mailing lists affiliated with this website will be public. Do not post confidential information, especially passwords!