Re: [Wikitech-l] Password Hash

2014-02-26 Thread Jeroen De Dauw
Hey, I just stumbled across this wrapper [0] for the password functions introduced in PHP 5.5. Figured this stuff is also relevant in the discussion. [0] https://github.com/ircmaxell/password_compat [1] http://de1.php.net/password Cheers -- Jeroen De Dauw http://www.bn2vs.com Don't panic. Don't

Re: [Wikitech-l] Password Hash

2014-02-06 Thread Chris Steipp
On Wed, Feb 5, 2014 at 8:26 PM, C. Scott Ananian wrote: > Password hashing algorithms are not the same as general hash algorithms. I > would prefer we didn't use whirlpool; it is "recommended by NESSIE and ISO" > as a hash function, but as a password hash. CWE916 recommends "bcrypt, > scrypt, an

Re: [Wikitech-l] Password Hash

2014-02-06 Thread Thomas Gries
Where we are at it: This en-wiki article [2] - https://en.wikipedia.org/wiki/Bcrypt currently lacks the important information of the password limitation. Should be added by someone who's an expert in that field. ___ Wikitech-l mailing list Wikitech-

Re: [Wikitech-l] Password Hash

2014-02-06 Thread Thomas Gries
Am 05.02.2014 23:03, schrieb Brion Vibber: > Is the 72-byte truncation a general bcrypt problem or specific to > password_hash()? Any concerns or a non-issue? Note that some non-Latin > strings can only fit 24 chars in 72 bytes of UTF-8. Long enough for most > passwords, but some people like passph

Re: [Wikitech-l] Password Hash

2014-02-05 Thread Daniel Friesen
Strictly speaking it would be best to implement PBKDF2 to accept any hash algorithm it's configured with – like I did in my password-hashing branch – rather than using just whirlpool. I thought I even used whirlpool myself as the default in my branch, but it looks like I actually played it safe an

Re: [Wikitech-l] Password Hash

2014-02-05 Thread C. Scott Ananian
Password hashing algorithms are not the same as general hash algorithms. I would prefer we didn't use whirlpool; it is "recommended by NESSIE and ISO" as a hash function, but as a password hash. CWE916 recommends "bcrypt, scrypt, and PBKDF2" specifically for password hashing. To be clear, I have

Re: [Wikitech-l] Password Hash

2014-02-05 Thread Marc A. Pelletier
On 02/05/2014 09:34 PM, Tim Starling wrote: > Maybe Chris's phrasing misled you: I didn't invent the Whirlpool > algorithm And so it did; something a quick google would have revealed. In my defense, "The Whirlpool algorithm by Tim" was pretty convincing attribution. :-) I'd need to read up on th

Re: [Wikitech-l] Password Hash

2014-02-05 Thread Tim Starling
On 06/02/14 08:17, Marc A. Pelletier wrote: > On 02/05/2014 03:53 PM, Chris Steipp wrote: >> The Whirlpool algorithm by Tim would force password cracking software to do >> a custom implementation for our hashes. > > No judgment is passed on Tim, but rule number one of crypto is never try > to roll

Re: [Wikitech-l] Password Hash

2014-02-05 Thread Chris Steipp
On Wed, Feb 5, 2014 at 3:08 PM, Zachary Harris wrote: > tl;dr PBKDF2 and bcrypt are both perfectly acceptable for security. > > > PBKDF2 and bcrypt, as well as scrypt, are all well regarded by current > infosec industry standards (with "current" being a key word). " While > there is active debate

Re: [Wikitech-l] Password Hash

2014-02-05 Thread Zachary Harris
tl;dr PBKDF2 and bcrypt are both perfectly acceptable for security. PBKDF2 and bcrypt, as well as scrypt, are all well regarded by current infosec industry standards (with "current" being a key word). " While there is active debate about which of these is the most effective, they are all stronger

Re: [Wikitech-l] Password Hash

2014-02-05 Thread Chris Steipp
On Wed, Feb 5, 2014 at 1:03 PM, Brion Vibber wrote: > Offhand I'd say "use bcrypt", but from http://us3.php.net/password_hash -- > > "*Caution* > > Using the *PASSWORD_BCRYPT* for the *algo* parameter, will result in the > *password* parameter being truncated to a maximum length of 72 characters.

Re: [Wikitech-l] Password Hash

2014-02-05 Thread Marc A. Pelletier
On 02/05/2014 03:53 PM, Chris Steipp wrote: > The Whirlpool algorithm by Tim would force password cracking software to do > a custom implementation for our hashes. No judgment is passed on Tim, but rule number one of crypto is never try to roll your own unless you happen to have years and years of

Re: [Wikitech-l] Password Hash

2014-02-05 Thread Jeroen De Dauw
Hey, Is the 72-byte truncation a general bcrypt problem or specific to > password_hash()? Any concerns or a non-issue? Note that some non-Latin > strings can only fit 24 chars in 72 bytes of UTF-8. Long enough for most > passwords, but some people like passphrases. :) > I have a 100 char password

Re: [Wikitech-l] Password Hash

2014-02-05 Thread Brion Vibber
Offhand I'd say "use bcrypt", but from http://us3.php.net/password_hash -- "*Caution* Using the *PASSWORD_BCRYPT* for the *algo* parameter, will result in the *password* parameter being truncated to a maximum length of 72 characters. This is only a concern if are using the same salt to hash strin

[Wikitech-l] Password Hash

2014-02-05 Thread Chris Steipp
Hi all, I wanted to bikeshed just a little bit, to make sure there is some consensus. tl;dr We're upgrading the password hash used to store passwords to make offline cracking more difficult. In doing that, we need to set one of the options as default. Speak up if you have strong feelings about one