免费视频淫片aa毛片_日韩高清在线亚洲专区vr_日韩大片免费观看视频播放_亚洲欧美国产精品完整版

打開APP
userphoto
未登錄

開通VIP,暢享免費(fèi)電子書等14項(xiàng)超值服

開通VIP
SAP password hash algorithms
Hi there,
in this article, I'd like to summarize what I found out about SAP's password storage mechanism (for SU01 users, not the SecStore).
Basics
The passwords of all users are stored in table USR02 as one (or more) cryptographic hash value(s).
Table USH02 and some others contain the password history (see SAP Note 1484692). This history used to be limited to the last 5 entries per user before NW 7.0; meanwhile the number of entries is customizable via the profile parameter login/password_history_size (see SAP Note 862989).
The hash algorithm has changed several times over time – either due to weaknesses or as a result of the increase in computing performance (see "CODVN H" below).
Per definition, the result of a cryptographic hash function is/should be irreversible, i.e. one cannot/shouldn't be able to retrieve the plain text password from the hash value… but that's the point where the fun starts! 
SAP Note 1237762 gives a good overview of hash attacks and has some rather helpful tips on how to prevent them!
The password cracking tool John the Ripper (with the "Jumbo" patch) supports two of SAP's common hash algorithms (CODVN B & F/G). Give it a try, if you're serious about the security of your passwords!
Hash algorithms
This table summarizes the details of all currently available password hash algorithms (as per Q4/2012):
USR02-
CODVNALGO-
RITHMMAX. PASSW. LENGTHPW.
CASECHARSETSALTNOTESSAP NOTEHASH IN
USR02-...
A?8upperASCII
(limited)Character 1-6 of the username
(upper-case)Unsupported characters (probably the same as with CODVN B) in the password and salt are replaced by an apostrophe (?'?).
Superseded by code version B (automatic migration during logon).721119BCODE
BMD5-based8upperASCII
(limited)Username
(upper-case)Unsupported characters (see note) in the password and salt are replaced by ?^?735356BCODE
C-Never implemented-
DMD5-based8upperUTF-8Username
(upper-case)Superseded by code version E
(but almost identical)-BCODE
EMD5-based8upperUTF-8Username
(upper-case)Correction of code version D874738BCODE
FSHA1-based40sensitiveUTF-8Username
(upper-case)-1488159PASSCODE
G= Code versions B & FBCODE &
PASSCODE
Hgeneric hash
(curr. only iSSHA-1)40sensitiveUTF-8randomHash algorithm and options can be set via parameter login/password_hash_algorithm991968PWDSALTEDHASH
I= Code versions B, F & HBCODE,
PASSCODE &
PWDSALTEDHASH
The MD5- and SHA1-based algorithms consist of two hash iterations with "some Walld0rf magic" in between — for details, have a look at this posting in the john-users mailing list.
Kernel & profile parameters
The following has an impact on the used hash algorithm:
the SAP kernel version
the profile parameters:login/password_charset
login/password_downwards_compatibility — if available
The following tables show the effect of the above on the hash algorithm on some test-systems:
 
 
Sources & further reading
Here's where the information in the above "Hash algorithms" table came from – plus additional resources:
SAP Note 2467: Password rules and preventing incorrect logons
SAP Note 721119: Logon with (delivered) default user fails
SAP Note 735356: Special character in passwords; reactivation not possible
SAP Note 862989: New password rules as of SAP NetWeaver 2004s
SAP Note 874738: New password hash calculation procedure (code version E)
SAP Note 991968: Value list for login/password_hash_algorithm
SAP Note 1023437: Downwardly incompatible passwords since NW2004s
SAP Note 1237762: Protection against password hash attacks
SAP Note 1300104: CUA - New password hash procedures - Background information
SAP Note 1458262: Recommended settings for password hash algorithms
SAP Note 1484692: Protect read access to password hash value tables
SAP Note 1488159: SUIM - RSUSR003 - Incorrect results for CODVN = F
Openwall Wiki: Excerpts from john-users mailing list ← search for "SAP"
Paper: "Perfect Storm - The Brave New World of SAP Security"
Paper: "SAP Passwort Sicherheit" (2004) – German
Onapsis has 2 great articles:Checking SAP password strength - Part 1 (ABAP) and
Checking SAP password strength - Part 2 (Java)
Happy reading — this is really helpful stuff! 
本站僅提供存儲(chǔ)服務(wù),所有內(nèi)容均由用戶發(fā)布,如發(fā)現(xiàn)有害或侵權(quán)內(nèi)容,請(qǐng)點(diǎn)擊舉報(bào)。
打開APP,閱讀全文并永久保存 查看更多類似文章
猜你喜歡
類似文章
Calculate Signatures(header+digest)
PHP的Mcrypt加密擴(kuò)展知識(shí)了解
CTF .swp文件泄露 MD5擴(kuò)展攻擊 [What is hash!]
最新NOD32升級(jí)id-nod32升級(jí)
c#更新數(shù)據(jù)庫(kù)中數(shù)據(jù)
查看并修改Oracle用戶的密碼【oracle不能查看dba
更多類似文章 >>
生活服務(wù)
分享 收藏 導(dǎo)長(zhǎng)圖 關(guān)注 下載文章
綁定賬號(hào)成功
后續(xù)可登錄賬號(hào)暢享VIP特權(quán)!
如果VIP功能使用有故障,
可點(diǎn)擊這里聯(lián)系客服!

聯(lián)系客服