On Sun, Jun 10, 2012 at 3:53 PM, Gleb Kurtsou <gleb.kurt...@gmail.com> wrote:
> On (10/06/2012 11:02), Simon L. B. Nielsen wrote:
>>
>> On 8 Jun 2012, at 13:51, Dag-Erling Smørgrav wrote:
>>
>> > We still have MD5 as our default password hash, even though known-hash
>> > attacks against MD5 are relatively easy these days.  We've supported
>> > SHA256 and SHA512 for many years now, so how about making SHA512 the
>> > default instead of MD5, like on most Linux distributions?
>>
>> Has anyone looked at how long the SHA512 password hashing actually takes on 
>> modern computers?
>>
>> The "real" solution for people who care significantly about this seems 
>> something like the algorithm pjd implemented (I think he did it at least) 
>> for GELI, where the number of rounds is variable and calculated so it takes 
>> X/0.X seconds on the specific hardware used. That's of course a lot more 
>> complicated, and I'm not sure if it would work with the crypt() API.
>
> Do you mean pkcs5v2_calculate from geli? It seems to have a drawback

Correct.

> that results produced depend on actual CPU load.

That's not the drawback, but the whole point (well, at least a point).
While it can of course produce fewer rounds on different systems,
especially on fast systems you will likely end up with a lot more
rounds than whatever the default is.

> % ./pkcs5v-test [*]
> 541491
> 539568
> 542352
> 540376
> 388285 -- start several instances of pkcs5v-test in parallel
> 303071
> 284793
> 281110
>
> It would be awesome to provide user with options to configure minimal
> and maximal iteration count and randomly choose iteration count within
> the range for each new password. Such trivial change should considerably
> complicate mass password bruteforce cracking.

That's also an option. I'm not sure how well that would work in practice.

> Variable number of rounds for a password would also require changing
> crypt() interface.

Exactly, so probably not actually a working solution for normal case,
and possibly just not worth the trouble at all due to compatibility.

> Why does nobody mention scrypt? It looks very attractive in longer
> perspective.

It's not in the base system yet, last I checked anyway, so I assume
that either Colin still don't find it ready for general use, or he has
just been too busy.

-- 
Simon
_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to