On 2015-09-15 10:00, Felix Fietkau wrote:
> On 2015-09-15 08:20, Etienne Champetier wrote:
>> Hi,
>> 
>> Le 15 sept. 2015 01:40, "Felix Fietkau" <n...@openwrt.org
>> <mailto:n...@openwrt.org>> a écrit :
>>>
>>> On 2015-09-15 00:22, Etienne Champetier wrote:
>>> > Hi Felix,
>>> >
>>> > Maybe we should keep sha512 and switch to it? md5 is not best security
>>> > practice these days.
>>> I don't see the point. It's true that for file integrity purposes, md5
>>> is weaker than sha512, but for salted passwords it should not make much
>>> of a practical difference. Cryptographic attacks against MD5 don't work
>>> here, brute force is still the fastest way to crack those.
>> 
>> Yep, and there is a 100x between md5 and sha512, so it does matter a bit
>> http://blog.codinghorror.com/speed-hashing/
> If you're interested in making passwords hard to crack, switching to
> SHA512 is an almost pointless band-aid, not a real fix. In the world of
> cryptography, a 100x increase isn't exactly a lot. If you want to make
> passwords really hard to crack, you could make the code use something
> like PBKDF2...
And here's another thing: There's an easy way you can increase the
cracking difficulty a lot more than 100x without having to change the
code at all: Just make your passwords two characters longer :)

- Felix
_______________________________________________
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel

Reply via email to