Il giorno 11/feb/2013, alle ore 14:54, Giovanni Bajo <[email protected]> ha 
scritto:

> Il giorno 11/feb/2013, alle ore 14:38, Donald Stufft 
> <[email protected]> ha scritto:
> 
>> On Monday, February 11, 2013 at 8:15 AM, M.-A. Lemburg wrote:
>>> Giovanni Bajo wrote:
>>>> Il giorno 11/feb/2013, alle ore 13:25, Jesse Noller <[email protected]> ha 
>>>> scritto:
>>>> 
>>>>> Actually I was thinking about this in the shower: the likelihood that 
>>>>> pypi users used the same passwords as they did on the wiki is probably 
>>>>> much higher than any of us assume.
>>>> 
>>>> Given that the passwords were unsalted in both instances, a set 
>>>> intersection is enough to verify.
>>> 
>>> The moin wiki passwords were salted.
>>> 
>>> The reason we reset the passwords, was that the attackers had
>>> access to both the salt and the hashes.
>>> 
>> What were they hashed with? Even with a salt a fast hash is trivial to
>> bruteforce for a large number of passwords in practically no time
>> with trivial hardware. 
>> 
> 
> 
> Yes, and that's why all passwords were reset.
> 
> PyPI is even worse (unsalted SHA), but there is no current evidence of 
> compromise. The discussion here is that I suggest to migrate all hashes 
> immediately to bcrypt (by bcrypting the SHA1 hash, and then detecting this at 
> startup), while Christian's proposal is to migrate as users login, so leaving 
> SHA1 hashes in that DB for an unknown number of days/weeks/months.

.... detecting this AT LOGIN ....

-- 
Giovanni Bajo   ::  [email protected]
Develer S.r.l.  ::  http://www.develer.com

My Blog: http://giovanni.bajo.it






Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
Catalog-SIG mailing list
[email protected]
http://mail.python.org/mailman/listinfo/catalog-sig

Reply via email to