Re: blf uses only 2^4 round for passwd encoding?! [Re: Default

看板FB_security作者時間13年前 (2012/06/11 09:32), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串2/5 (看更多)
On 6/11/12, RW <rwmaillists@googlemail.com> wrote: > On Mon, 11 Jun 2012 00:37:30 +0200 > Oliver Pinter wrote: > > >> 16 rounds in 2012? It is not to weak?! > > It's hard to say. Remember that blowfish was designed as a cipher not > a hash. It's designed to be fast, but to still resist known plaintext > attacks at the beginning of the ciphertext. It was also designed to > work directly with a passphrase because there was a history of > programmers abusing DES by using simple ascii passwords as keys. > > For these reasons initialization is deliberately expensive, > effectively it already contains an element of passphrase hashing. Yes, I know that the blowfish is a cipher and not hash, but I think 16 round today is too small. I checked this in a freshly installed openbsd, and they used 256 round ($2a$08$...) . > _______________________________________________ > freebsd-security@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-security > To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org" > _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1FrKgJ1y (FB_security)
討論串 (同標題文章)
文章代碼(AID): #1FrKgJ1y (FB_security)