Xin LI writes:

> The slowness was useful at the time when the code was written, but I don't
> think it would buy us as much nowadays, expect the slowness be halved from
> time to time, not to mention the use of distributed techniques to
> accelerate the build of dictionaries.

The goal is to make the attacker *have* to use distributed techniques and to
buy more gear, rather than simply be able to brute them all in a few minutes
on a single cheap PC. MD5_SLOW is the factor by which you increase the
attacker's cost; it is easy for the defender to go very high here because
checking any one password is still fast. Distributed attacks existed when
PHK wrote the code originally, too -- I don't think anything has
fundamentally changed since then. Attackers use arrays of GPUs now? Ok,
increase MD5_SLOW some more.

> Second, recent research has shown MD5 to be vulnerable to collision
> attacks [1] by the end of 2008.

I'm not sure that attack against MD5 is relevant here, because we're not
using it in a way where collisions hurt. (Someone correct me if I'm wrong.)
In fact, moving to a modern hash would weaken the defense, because e.g.
Skein is brilliantly fast -- the opposite of our goal.

See also:

http://chargen.matasano.com/chargen/2007/9/7/enough-with-the-rainbow-tables-what-you-need-to-know-about-s.html

"""The major advantage of adaptive hashing is that you get to tune it. As
computers get faster, the same block of code continues to produce passwords
that are hard to crack."""

_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to