Trac is being migrated to new services! Issues can be found in our new
YouTrack instance and WIKI pages can be found on our
website.
- Timestamp:
-
Sep 28, 2008, 6:09:19 PM (15 years ago)
- Author:
-
petr.bug
- Comment:
-
results from IRC chat with elb, Err and me around 16:55 UTC
Legend:
- Unmodified
- Added
- Removed
- Modified
-
v11
|
v12
|
|
106 | 106 | If someone were to do this in a way that worked well, securely, and seamlessly to the user, without interfering with people who prefer to trust their file system's security, we'd gladly accept it. |
107 | 107 | |
108 | | == Summer of Code == |
| 108 | == Desktop keyring == |
109 | 109 | |
110 | | There is currently a SoC [http://developer.pidgin.im/wiki/GSoC2008/MasterPassword project] going on about this topic. |
| 110 | There is currently a Google Summer of Code [http://developer.pidgin.im/wiki/GSoC2008/MasterPassword project] going on about this topic. |
| 111 | |
| 112 | == DIGEST-MD5 in Jabber/XMPP == |
| 113 | |
| 114 | [http://www.xmpp.org/rfcs/rfc3920.html#security-mandatory RFC 3920] requires that Jabber/XMPP servers implement SASL DIGEST‑MD5 authentication method. This allows clients (and servers) to not store the password in plain-text but instead store cryptographic hash (MD5) of user name, domain and password. If the password is strong this makes nearly impossible for an attacker to recover the password. |
| 115 | |
| 116 | Following downsides remain: |
| 117 | - If accounts.xml is revealed, the attacker is still able to login to the Jabber account (but not to, say, email account, even if they had the same password) |
| 118 | - User may by fooled in to believing accounts.xml does not contain sensitive information and give the file out. (If the password is weak it can be recovered from the hash) |
| 119 | - When server stops supporting DIGEST‑MD5 authentication (but still provide other password-based), Pidgin will have to ask for password. |
| 120 | |
| 121 | Currently (as of 2008) Pidgin does not store the hash. elb: "I would accept a good patch to implement that" |
All information, including names and email addresses, entered onto this website or sent to mailing lists affiliated with this website will be public. Do not post confidential information, especially passwords!