Re: PHK's MD5 might not be slow enough anymore

看板FB_security作者時間16年前 (2010/01/29 07:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串22/35 (看更多)
On Thu, 28 Jan 2010, Mike Andrews wrote: > On 1/28/10 3:18 PM, Chris Palmer wrote: >> For backwards compatibility, which do people prefer: Creating a new $N$ >> prefix every time we re-tune the algorithm, or using a new notation to say >> how many times this password was hashed? For example: $1.1000$, $1.100000$, >> et c.? >> >> I prefer the latter. It can work with Blowfish, too, and anything else >> people come up with in the future. > > The Blowfish one already has that feature. > > A long time ago (like FreeBSD 6.something, maybe earlier) I changed all my > /etc/login.conf files to set "passwd_format=blf" and all my password hashes > are in the format "$2a$04$salthash" -- with the "04" being the (default) > number of rounds of Blowfish to run. I have some users where it's set to 11 > rounds, and as you'd expect, it puts a pretty big hurt on the ability of > things like John The Ripper to attack the hashes. Actaully that's not the number of rounds, it's the log2() of the number of rounds. So 04 is really 2^4=16 rounds (the minimum), 11 is 2^11=2048 rounds, and the maximum is 31 -- which as the source code states, oughta scale pretty well for a while. :) See /usr/src/secure/lib/libcrypt/crypt-blowfish.c There is probably a login.conf knob to raise the default number of rounds beyond 2^4. But the point remains: look at what FreeBSD already has. :) _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1BOXSlLa (FB_security)
討論串 (同標題文章)
文章代碼(AID): #1BOXSlLa (FB_security)