Understandable that SHA256 is good for today but SHA512 is good for tomorrow 
and has excellent support in all major languages, products, etc. Oracle is the 
only thing I can think of that doesn't support it out of the box.

I agree on balance but I can certainly spare the 32 bytes of storage. :)

Justin

On Mar 29, 2013, at 7:23 PM, John Kinsella <j...@stratosec.co> wrote:

> Never too late. :)
> 
> Looking at [1], it'll take about 2E64 days to search the SHA256 keyspace with 
> a brute forcer written for a GPU accelerator. Even with 10,000 of them, it'll 
> take way, way too long. Bitcoin coin uses SHA256, so I think it's safe for a 
> while. :)
> 
> Yes, SHA512 would be "more safe," but ya gotta ask what you're really getting 
> by going to the bigger key…security is about a balance. If you're using ACS 
> to run a cloud cracking SHA256 passwords, then maybe you should use SHA512 
> passwords in ACS. ;)
> 
> John
> http://www.insidepro.com/eng/egb.shtml
> 
> On Mar 29, 2013, at 4:36 PM, Justin Grudzien 
> <grudz...@gmail.com<mailto:grudz...@gmail.com>>
> wrote:
> 
> I apologize for jumping into this conversation late, but I am new to the 
> developer mailing list. Why would we choose SHA256+salt over SHA512+salt? 
> SHA512+salt's storage is insignificant when compared to SHA256 and the 
> chances of a birthday attack are significantly reduced. As a security 
> professional I would argue for the best possible hashing algorithm available, 
> especially when there is little to no cost.
> 
> Justin
> 
> On Mar 29, 2013, at 6:00 PM, "Min Chen" 
> <min.c...@citrix.com<mailto:min.c...@citrix.com>> wrote:
> 
> 
> -----------------------------------------------------------
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/10039/#review18548
> -----------------------------------------------------------
> 
> 
> 
> client/tomcatconf/componentContext.xml.in
> <https://reviews.apache.org/r/10039/#comment38873>
> 
>  This componentContext.xml.in and nonossComponentContext.xml.in should be put 
> into applicationContext.xml since they are the same for nonoss and oss 
> versions.
> 
> 
> - Min Chen
> 
> 
> On March 28, 2013, 8:26 p.m., Venkata Siva Vijayendra Bhamidipati wrote:
> 
> -----------------------------------------------------------
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/10039/
> -----------------------------------------------------------
> 
> (Updated March 28, 2013, 8:26 p.m.)
> 
> 
> Review request for cloudstack, Hugo Trippaers, Kelven Yang, and Min Chen.
> 
> 
> Description
> -------
> 
> Changing default password encoding mechanism from MD5 to SHA256Salted.
> 
> 
> This addresses bug CS-1734.
> 
> 
> Diffs
> -----
> 
> api/src/org/apache/cloudstack/api/command/admin/account/CreateAccountCmd.java 
> 89673ea
> api/src/org/apache/cloudstack/api/command/admin/user/CreateUserCmd.java 
> fb29e1a
> api/src/org/apache/cloudstack/api/command/admin/user/UpdateUserCmd.java 
> 1f31662
> client/tomcatconf/componentContext.xml.in 016df0a
> client/tomcatconf/nonossComponentContext.xml.in 8f8dae5
> developer/developer-prefill.sql 6300d35
> plugins/user-authenticators/ldap/src/com/cloud/server/auth/LDAPUserAuthenticator.java
>  61eebe5
> plugins/user-authenticators/md5/src/com/cloud/server/auth/MD5UserAuthenticator.java
>  026125e
> plugins/user-authenticators/plain-text/src/com/cloud/server/auth/PlainTextUserAuthenticator.java
>  52e7cb3
> plugins/user-authenticators/sha256salted/src/com/cloud/server/auth/SHA256SaltedUserAuthenticator.java
>  1b29f69
> server/src/com/cloud/server/ManagementServerImpl.java b689f93
> server/src/com/cloud/user/AccountManagerImpl.java b69f314
> 
> Diff: https://reviews.apache.org/r/10039/diff/
> 
> 
> Testing
> -------
> 
> Manual testing done for both oss and nonoss components. Both admin and users 
> added later are encoded according to the scheme configured, and authenticated 
> by the same scheme.
> 
> To change the order of the schemes, modify the following list properties in 
> client/tomcatconf/nonossComponentContext.xml.in or 
> client/tomcatconf/componentContext.xml.in as applicable, to the desired order:
> 
>  <property name="UserAuthenticators">
>       <list>
>          <ref bean="SHA256SaltedUserAuthenticator"/>
>          <ref bean="MD5UserAuthenticator"/>
>          <ref bean="LDAPUserAuthenticator"/>
>          <ref bean="PlainTextUserAuthenticator"/>
>      </list>
>  </property>
> 
>  <property name="UserPasswordEncoders">
>      <list>
>          <ref bean="SHA256SaltedUserAuthenticator"/>
>           <ref bean="MD5UserAuthenticator"/>
>           <ref bean="LDAPUserAuthenticator"/>
>          <ref bean="PlainTextUserAuthenticator"/>
>       </list>
> 
> 
> Thanks,
> 
> Venkata Siva Vijayendra Bhamidipati
> 
> 
> Stratosec<http://stratosec.co> - Secure Infrastructure as a Service
> o: 415.315.9385
> @johnlkinsella<http://twitter.com/johnlkinsella>
> 

Reply via email to