使用“连接”对密码加盐日期时间
我在其他文章中看到过此信息,但大多数都是用已知值(例如用户名)进行加盐。如果加入
数据是,使用加入
日期时间(或加入
日期时间的MD5)对密码加盐是否是进一步保护凭据的安全方法没有暴露在网站的任何地方?
提前致谢!
I've seen this information in other articles but most were salting with a known value (like a username). Is salting a password with the joined
datetime (or an MD5 of the joined
datetime) a secure way of further securing credentials if the joined
data is not exposed anywhere in the site?
Thanks in advance!
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(2)
用真正随机的盐代替盐。猜测基于日期的盐似乎有点太容易了,特别是如果有人知道该人成为该网站的会员多久了。
你可以这样做:
Salt with a truly random salt instead. Guessing a date based salt seems a little too easy, especially if someone is aware how long the person has been a member of the site.
You could do something like:
我实际上做了这样的事情:
I actually did something like this: