From owner-freebsd-security@FreeBSD.ORG  Thu Jan 28 20:22:52 2010
Return-Path: <owner-freebsd-security@FreeBSD.ORG>
Delivered-To: freebsd-security@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34])
	by hub.freebsd.org (Postfix) with ESMTP id A9D1C106566C
	for <freebsd-security@freebsd.org>;
	Thu, 28 Jan 2010 20:22:52 +0000 (UTC) (envelope-from cswiger@mac.com)
Received: from asmtpout026.mac.com (asmtpout026.mac.com [17.148.16.101])
	by mx1.freebsd.org (Postfix) with ESMTP id 91ADE8FC0C
	for <freebsd-security@freebsd.org>;
	Thu, 28 Jan 2010 20:22:52 +0000 (UTC)
MIME-version: 1.0
Content-transfer-encoding: 7BIT
Content-type: text/plain; charset=us-ascii
Received: from cswiger1.apple.com ([17.209.4.71])
	by asmtp026.mac.com (Sun Java(tm) System Messaging Server 6.3-8.01
	(built Dec
	16 2008; 32bit)) with ESMTPSA id <0KWZ00CQM4LXWG30@asmtp026.mac.com> for
	freebsd-security@freebsd.org; Thu, 28 Jan 2010 12:22:52 -0800 (PST)
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0
	ipscore=0 phishscore=0 bulkscore=0 adultscore=0 classifier=spam
	adjust=0
	reason=mlx engine=5.0.0-0908210000 definitions=main-1001280172
From: Chuck Swiger <cswiger@mac.com>
In-reply-to: <20100128151026.5738b6c1.wmoran@collaborativefusion.com>
Date: Thu, 28 Jan 2010 12:22:45 -0800
Message-id: <765BF30E-49B7-4EDB-A1FC-41D72AEE1EAA@mac.com>
References: <20100128182413.GI892@noncombatant.org>
	<20100128135410.7b6fe154.wmoran@collaborativefusion.com>
	<20100128193941.GK892@noncombatant.org>
	<20100128151026.5738b6c1.wmoran@collaborativefusion.com>
To: Bill Moran <wmoran@collaborativefusion.com>
X-Mailer: Apple Mail (2.1077)
Cc: Chris Palmer <chris@noncombatant.org>, freebsd-security@freebsd.org
Subject: Re: PHK's MD5 might not be slow enough anymore
X-BeenThere: freebsd-security@freebsd.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: "Security issues \[members-only posting\]"
	<freebsd-security.freebsd.org>
List-Unsubscribe: <http://lists.freebsd.org/mailman/listinfo/freebsd-security>, 
	<mailto:freebsd-security-request@freebsd.org?subject=unsubscribe>
List-Archive: <http://lists.freebsd.org/pipermail/freebsd-security>
List-Post: <mailto:freebsd-security@freebsd.org>
List-Help: <mailto:freebsd-security-request@freebsd.org?subject=help>
List-Subscribe: <http://lists.freebsd.org/mailman/listinfo/freebsd-security>, 
	<mailto:freebsd-security-request@freebsd.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 20:22:52 -0000

Hi--

On Jan 28, 2010, at 12:10 PM, Bill Moran wrote:
> This would also introduce a complete incompatibility between systems.
> I, for one, frequently copy password files from one system to another.
> I expect $1$ to be compatible on all systems.

Exactly.  Just like classic DES passwords were portable to all platforms.

> If a new algorithm is to be used, why even start with md5?  Why not
> start with something that's inherently stronger and more CPU intensive?
>> 
> From there, assign it a new algorithm number.  See the "Modular Crypt"
> section of crypt(3).  Then compatibility is maintained.

+1.  We're probably fine with MD5 password hashes against all but extreme measures for some time to come, but adding SHA-1 and being ready for whatever algorithm(s) might be chosen by NIST for SHA-3 would be a fine thing to do.

Regards,
-- 
-Chuck