[Kolab-devel] Password hashing
Martin Konold
martin.konold at erfrakon.de
Thu Mar 31 18:37:02 CEST 2005
Am Donnerstag, 31. März 2005 17:52 schrieb Roland Gruber:
Hi Roland,
> Windows passwords have the same problem, they can easily be cracked if
> an attacker calculates the hashes for all possible passwords.
If I understand it correctly the attacker needs access to the hashed passwords
in order to succeed.
We don't allow reading of the password. (wx)
access to attr=userPassword
by group/kolabGroupOfNames="cn=admin,cn=internal,@@@base_dn@@@" =wx
by group/kolabGroupOfNames="cn=maintainer,cn=internal,@@@base_dn@@@" =wx
by self =wx
by anonymous =x
by * none stop
Regards,
-- martin
--
"I am committed to helping Ohio deliver its electoral votes to the
President next year." -- 2004, Wally O'Dell - CEO of Diebold, Inc.
e r f r a k o n - Stuttgart, Germany
Erlewein, Frank, Konold & Partner - Beratende Ingenieure und Physiker
More information about the devel
mailing list