Another thought:
>From   http://tools.ietf.org/html/rfc2898#page-6 PKCS#5 rfc2898  section 4.1
(Salt):
         For instance, the salt could have
         an additional non-random octet that specifies the purpose of
         the derived key. Alternatively, it could be the encoding of a
         structure that specifies detailed information about the derived
         key, such as the encryption or authentication technique and a
         sequence number among the different keys derived from the
         password.  The particular format of the additional data is left
         to the application.
I wonder if this suggestion makes for a reasonable approach for salt:
Allow the first byte of the salt to be interpreted by a user-provided class
that implements a simple Shiro interface.
Of course it is more transparent and simple to have some sort of
configuration in the data store specifying how the the password was hashed -
algorithm, number of iterations, but it seems to me there is some value in
the attacker with access to hashed passwords and salt values not knowing
that information. 
-- 
View this message in context: 
http://shiro-developer.582600.n2.nabble.com/Password-and-hash-management-tp5667050p5695239.html
Sent from the Shiro Developer mailing list archive at Nabble.com.

Reply via email to