Hello,

Thanks. The other utility I would be using is the Roundcube webmail
password plugin.  Still trying to figure the best option.

More opinions?
Thanks.
Dave.


On 6/24/23, Robert Lister <r...@lentil.org> wrote:
>
> I did a similar upgrade, and now in the process of migrating from
> SHA512-CRYPT
> to BLF-CRYPT with an appropriately set rounds, as I think the default
> rounds
> is a little low.
>
> A good write-up on migrating passwords and calculating the rounds:
> https://kaworu.ch/blog/2016/04/20/strong-crypt-scheme-with-dovecot-postfixadmin-and-roundcube/
>
>
> I would take into consideration the following factors when deciding the
> hashing algo.
>
> 1. Other tools/scripts that need to update or check passwords in the
> database,
>     for example:
>     - roundcube webmail has a plugin to allow users to change their
> password
>       using a variety of methods.
>     - postfixadmin
>
>     For a long time, bcrypt wasn't natively supported by either the
> version of php
>     or underlying OS libs, so these tools had to rely on calling "doveadm
> pw "
>     to generate BLF-CRYPT hashes. And assumed that doveadm was available
>     on the same server as it.
>
>     The latest versions support bcrypt and newer hashing algos natively.
>
>     Some tools might rely on the database (mysql/mariadb) to hash
> passwords, so
>     this may also be a consideration.
>
> 2. Server load / libs:
>
>     - The Dovecot docs:
> https://doc.dovecot.org/configuration_manual/authentication/password_schemes/
>       has this to say on ARGON2I/ARGON2ID:
>
>       "Argon2 is the winner of password hashing competition held at July
> 2015. The password will
>        start with $argon2i$ or $argon2id$. You can use -r to tune
> computational complexity,
>        minimum is 3. ARGON2ID is only available if your libsodium is
> recent enough.
>        ARGON2 can require quite a hefty amount of virtual memory, so we
> recommend that you set
>        service auth { vsz_limit = 2G } at least, or more."
>
> There's a good write up of considering the various algos:
>
> https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html
>
> I considered BLF-CRYPT (for the time being) to be strong enough and a
> good balance between compatibility, strength and server load, given the
> number of users etc.
>
> Rob
>
>
> On 2023-06-23 02:14, David Mehler wrote:
>> Hello,
>>
>> I'm migrating to a new server. It's running Debian 11 currently though
>> that's going 12 this weekend. Currently it uses Openssl v3.0.9, and
>> dovecot 2.3.13 and MySQL (in this case Mariadb) for storing user
>> account information v10.6.14. My question is in regards password
>> storage and scheme/encryption/salts.
>>
>> Currently they are stored in Mariadb password field with a type of
>> varchar and a 255 character length, and are stored as SHA512-CRYPT.
>> I'm wondering if I should keep this as is or when I migrate go to
>> another scheme? I'm thinking argon2i, argon2d, argon2id, sha512,
>> sha512-crypt, tiger2, saltt?
>
>
> --
> Robert Lister  - email:  r...@lentil.org      -     tel: 020 7043 7996
> _______________________________________________
> dovecot mailing list -- dovecot@dovecot.org
> To unsubscribe send an email to dovecot-le...@dovecot.org
>
_______________________________________________
dovecot mailing list -- dovecot@dovecot.org
To unsubscribe send an email to dovecot-le...@dovecot.org

Reply via email to