This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/ncc-services-wg@ripe.net/
[ncc-services-wg] Securing MD5 Hashes in the RIPE Database
- Previous message (by thread): [ncc-services-wg] New article on RIPE Labs: Password Management in RIPE Database
- Next message (by thread): [ncc-services-wg] Securing MD5 Hashes in the RIPE Database
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Denis Walker
denis at ripe.net
Fri Nov 11 15:24:47 CET 2011
[Apologies for duplicate emails] Dear colleagues, The RIPE NCC has formed a technical solution for the issue of publicly displaying MD5 password hashes in the RIPE Database. The solution includes: * Filtering out of all "auth:" attributes from all query results of MNTNER objects * Displaying MNTNER objects with "auth:" attributes only in Webupdates after password authentication We published an article on RIPE Labs describing the details, including a mockup of the password authentication required by Webupdates: https://labs.ripe.net/Members/denis/securing-md5-hashes-in-the-ripe-database Additionally, we added a basic strength indicator to the password generator: https://apps.db.ripe.net/crypt/crypt.html We look forward to your comments and feedback, either on the Database Working Group mailing list or below the article itself. Kind regards, Denis Walker Business Analyst RIPE NCC Database Group
- Previous message (by thread): [ncc-services-wg] New article on RIPE Labs: Password Management in RIPE Database
- Next message (by thread): [ncc-services-wg] Securing MD5 Hashes in the RIPE Database
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]