On Wed, May 6, 2015 at 4:00 PM, Nikita Popov wrote:
> It should be further noted that there is no standardized crypt() format for
> PBKDF2 and password_hash() is a crypt-compatible API. As such supporting
> PBKDF2 there would be very problematic. We do already support it in the
> form of hash_pbk
On Wed, May 6, 2015 at 9:17 PM, Christoph Becker wrote:
> Leszek Krupinski:
>
> > While I agree that the statement "bcrypt is better than PBKDF2, thus only
> > bcrypt should be used" is difficult to defend,
>
> Well at least the StackExchange thread[1] pointed out by Nikita supports
> the stateme
Albert Casademont wrote:
> The iteration count is very different because in bcrypt it's not an
> iteration count number at all, it's a "cost". And it's kinda exponential: a
> hash with a cost of 11 is twice as hard to compute than that of a 10. At
> our company we are using a cost of 11 right now,
The iteration count is very different because in bcrypt it's not an
iteration count number at all, it's a "cost". And it's kinda exponential: a
hash with a cost of 11 is twice as hard to compute than that of a 10. At
our company we are using a cost of 11 right now, which means a hash is
computed in
Leszek Krupinski:
> While I agree that the statement "bcrypt is better than PBKDF2, thus only
> bcrypt should be used" is difficult to defend,
Well at least the StackExchange thread[1] pointed out by Nikita supports
the statement.
> I think saying "bcrypt is a
> homegrown solution, only PBKDF2
Nikita Popov wrote:
> On Tue, May 5, 2015 at 10:37 PM, Christoph Becker wrote:
>
>> In issue #64816[1] the OP suggests in the comment from [2015-05-05 04:34
>> UTC] that hash_pbkdf2() should be recommended for advanced users, and
>> that password_hash() should use PBKDF2 with at least 128,000 rou
On Tue, May 5, 2015 at 10:37 PM, Christoph Becker wrote:
> Hi everybody!
>
> In issue #64816[1] the OP suggests in the comment from [2015-05-05 04:34
> UTC] that hash_pbkdf2() should be recommended for advanced users, and
> that password_hash() should use PBKDF2 with at least 128,000 rounds.
>
P
While I agree that the statement "bcrypt is better than PBKDF2, thus only
bcrypt should be used" is difficult to defend, I think saying "bcrypt is a
homegrown solution, only PBKDF2 is a good way to do it" is also wrong and
OP is opinionated.
IMO - docs should describe alternatives, without stateme
On 2015-05-05 19:25, Rasmus Lerdorf wrote:
The ldap code could definitely use some attention. You have git access
now. Could you also go through the bug db and see if you can address
some of the longstanding reported issues?
Thanks for the git access.
I’m leaving for a week tonight, but I will