[cvsnt] Re: Authentication - Next best alternative to sspi
Rick Martin
rsmandcam at _NoSpam_At_All_sbcglobal.net
Thu Apr 14 22:10:53 BST 2005
Thanks for the info, Tony.
Rick
"Tony Hoyle" <tmh at nodomain.org> wrote in message
news:d3mknb$rah$1 at paris.nodomain.org...
> Rick Martin wrote:
>> First, let me say I'm no expert on sspi. The way I set it up was to not
>> put the password in the login statement inside wincvs. When you first
>> login you are prompted for the password. This password is encrypted and
>> stored in the local registry. That way you don't have to login each time
>> you start WinCVS. I don't know how strong or what type of encryption is
>> used. Perhaps Tony or another developer can jump in here.
>
> The encryption in the registry is pretty weak (it's the same encryption
> that pserver uses) but it's pretty hard to steal data out of a registry
> unless you're already authenticated as the user or an administrator (in
> both cases if a blackhat gets that far the cvs password is the least of
> your problems).
>
>> Also, I've used Ethereal to watch the TCP packets at the server end. The
>> initial packets used to negotiate the connection are basically in plain
>> text. However,the password is not. It is encrypted. The encrypted value
>> is not the same as what is stored in the registry. Again, I didn't try to
>> test the strength of the encryption.
>
> It's defined by Microsoft. NTLMv2 (which anything newer that NT4 will
> use) is pretty hard to crack. Not impossible I'm told.. If you are logged
> onto an active directory it uses Kerberos which is as good as impossible
> to crack.
>
> Tony
More information about the cvsnt
mailing list