That depends on what you mean by "retain".
Personally, I *hate* websites that force me to type in my password again because some other field failed validation. For bonus annoyance points they test the captcha as well.
--
You received this message because you are subscribed to the Google Groups "Java Posse" group.
To view this discussion on the web visit https://groups.google.com/d/msg/javaposse/-/W24TkW17ESQJ.
To post to this group, send email to java...@googlegroups.com.
To unsubscribe from this group, send email to javaposse+...@googlegroups.com.
For more options, visit this group at http://groups.google.com/group/javaposse?hl=en.
--
You received this message because you are subscribed to the Google Groups "Java Posse" group.
To post to this group, send email to java...@googlegroups.com.
To unsubscribe from this group, send email to javaposse+unsubscribe@googlegroups.com.
To unsubscribe from this group, send email to javaposse+...@googlegroups.com.
--
You received this message because you are subscribed to the Google Groups "Java Posse" group.
To post to this group, send email to java...@googlegroups.com.
To unsubscribe from this group, send email to javaposse+unsubscribe@googlegroups.com.
For more options, visit this group at http://groups.google.com/group/javaposse?hl=en.
Definitely the more purist approach. Less value for investigations.
In reality, Most organisations choose to take the chance on this in order to assist investigations when necessary
Smart software could also check whether the username is valid prior to including it in the log. Though this could open the possibility of timing attacks. The whirling dervish of security strikes again....
That said, why does the password (in particular) need to be tracked? I can think of a very good reason not to track it: mistyped passwords. Consider how many times you mistype your password. If a computer system were to track my mistyped passwords, the database containing those would become a treasure trove for internal fraudsters.
To unsubscribe from this group, send email to javaposse+...@googlegroups.com.
For more options, visit this group at http://groups.google.com/group/javaposse?hl=en.
--
You received this message because you are subscribed to the Google Groups "Java Posse" group.
To post to this group, send email to java...@googlegroups.com.
To unsubscribe from this group, send email to javaposse+...@googlegroups.com.
For more options, visit this group at http://groups.google.com/group/javaposse?hl=en.
--
You received this message because you are subscribed to the Google Groups "Java Posse" group.
To post to this group, send email to java...@googlegroups.com.
To unsubscribe from this group, send email to javaposse+...@googlegroups.com.
For more options, visit this group at http://groups.google.com/group/javaposse?hl=en.
To view this discussion on the web visit https://groups.google.com/d/msg/javaposse/-/XAIX9KBuS8cJ.
On Monday, January 14, 2013 11:16:56 PM UTC+1, Ryan Schipper wrote:That said, why does the password (in particular) need to be tracked? I can think of a very good reason not to track it: mistyped passwords. Consider how many times you mistype your password. If a computer system were to track my mistyped passwords, the database containing those would become a treasure trove for internal fraudsters.
The problem is that, as a user, we have no idea what goes on on the server side of a secure connection we POST credentials to. We have to entirely trust the developers behind any given service, which can be hard to do at times.
If HTTP included a mechanism to automatically hash the password (one can hand-code this today, but it's not common and it's not visible to the user of a service), this whole issue of password logging and theft would go away. The mechanism should probably include an optional salt, so that even attacks using rainbow tables on stolen log files would be useless.
but certainly there is no law that saya password must be stored this way or that and if you don't you go to JAIL!
I do not see how basic hashing of the password is worth much. It simply changes your password from what you typed, to something hashed off of what you typed. Right? I suppose you could have some sort of handshake to determine the salts on a per connection basis, that would help. But, at this point, it sounds like you are describing a poor attempt at recreating SSL.
I do not see how basic hashing of the password is worth much. It simply changes your password from what you typed, to something hashed off of what you typed. Right? I suppose you could have some sort of handshake to determine the salts on a per connection basis, that would help. But, at this point, it sounds like you are describing a poor attempt at recreating SSL.
HTTPS can prevent man-in-the-middle attacks, but it can not in any way be used to guarantee that your entered credentials is not logged or stored improperly at the receiving end. My point is that, as long as everyone agrees about the algorithms, whether you do hash(password) on the server or hash(hash(password)) split between the client and the server, is irrelevant in practice... but only the latter mechanism guarantees that no clear-text password ever enters the remote system. This could be build into HTTP (added to RFC).