Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. Database & SysAdmin
  3. Database
  4. storing passwords !

storing passwords !

Scheduled Pinned Locked Moved Database
databasesql-serversysadminwindows-adminalgorithms
3 Posts 3 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • R Offline
    R Offline
    ranjjj
    wrote on last edited by
    #1

    Microsoft SQL server version 7.0 --------------------------------- I have to find out a way..where in the login id and passwords can be stored in more secured way.. I browsed the netb and found out the following information..does this apply to sql server 7.0 ? " Passwords are stored in the sysxlogins table in encrypted form.SQL Server uses an undocumented function, pwdencrypt() to produce a hash of the user's password, which is stored in the sysxlogins table of the master database. When a user attempts to authenticate to SQL Server several things happen to do this. Firstly SQL Server examines the password entry for this user in the database and extracts the "salt" - 84449305 - in the example. This is then appended to the password the user supplies when attempting to log in and a SHA hash is produced. This hash is compared with the hash in the database and if they match the user is authenticated - and of course if the compare fails then the login attempt fails. The user's password is converted to it's UNICODE version if not already in this form.The salt is then appended to the end. This is then passed to the crypt functions in advapi32.dll to produce a hash using the secure hashing algorithm or SHA. The password is then converted to its upper case form, the salt tacked onto the end and another SHA hash is produced." This methodos storing is adopted by SQL server.. in this method...hacking the passwords sounds so easy! so.. Can someone suggest a better way for storing the passwords and the login information.. storing it in teh registry is also not safe .,I guess! thank u.. ranjani

    V 1 Reply Last reply
    0
    • R ranjjj

      Microsoft SQL server version 7.0 --------------------------------- I have to find out a way..where in the login id and passwords can be stored in more secured way.. I browsed the netb and found out the following information..does this apply to sql server 7.0 ? " Passwords are stored in the sysxlogins table in encrypted form.SQL Server uses an undocumented function, pwdencrypt() to produce a hash of the user's password, which is stored in the sysxlogins table of the master database. When a user attempts to authenticate to SQL Server several things happen to do this. Firstly SQL Server examines the password entry for this user in the database and extracts the "salt" - 84449305 - in the example. This is then appended to the password the user supplies when attempting to log in and a SHA hash is produced. This hash is compared with the hash in the database and if they match the user is authenticated - and of course if the compare fails then the login attempt fails. The user's password is converted to it's UNICODE version if not already in this form.The salt is then appended to the end. This is then passed to the crypt functions in advapi32.dll to produce a hash using the secure hashing algorithm or SHA. The password is then converted to its upper case form, the salt tacked onto the end and another SHA hash is produced." This methodos storing is adopted by SQL server.. in this method...hacking the passwords sounds so easy! so.. Can someone suggest a better way for storing the passwords and the login information.. storing it in teh registry is also not safe .,I guess! thank u.. ranjani

      V Offline
      V Offline
      Vasudevan Deepak Kumar
      wrote on last edited by
      #2

      Hi Ranjani: The following article on PlanetCode seems to be in line with your doubt. Check it out: http://www.planet-source-code.com/URLSEO/vb/scripts/ShowCode!asp/txtCodeId!735/lngWid!5/anyname.htm Deepak Kumar Vasudevan Personal Web: http://www24.brinkster.com/lavanyadeepak/default.asp I Blog At: http://deepak.blogdrive.com/

      S 1 Reply Last reply
      0
      • V Vasudevan Deepak Kumar

        Hi Ranjani: The following article on PlanetCode seems to be in line with your doubt. Check it out: http://www.planet-source-code.com/URLSEO/vb/scripts/ShowCode!asp/txtCodeId!735/lngWid!5/anyname.htm Deepak Kumar Vasudevan Personal Web: http://www24.brinkster.com/lavanyadeepak/default.asp I Blog At: http://deepak.blogdrive.com/

        S Offline
        S Offline
        Steve S
        wrote on last edited by
        #3

        Unless someone has found a way of generating passwords from their salted hash value, I don't understand what the problem is.... Steve S

        1 Reply Last reply
        0
        Reply
        • Reply as topic
        Log in to reply
        • Oldest to Newest
        • Newest to Oldest
        • Most Votes


        • Login

        • Don't have an account? Register

        • Login or register to search.
        • First post
          Last post
        0
        • Categories
        • Recent
        • Tags
        • Popular
        • World
        • Users
        • Groups