From owner-freebsd-security@FreeBSD.ORG Mon Jun 11 09:35:07 2012 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 29B931065672; Mon, 11 Jun 2012 09:35:07 +0000 (UTC) (envelope-from lars@e-new.0x20.net) Received: from mail.0x20.net (mail.0x20.net [217.69.76.211]) by mx1.freebsd.org (Postfix) with ESMTP id C351E8FC0A; Mon, 11 Jun 2012 09:35:06 +0000 (UTC) Received: from mail.0x20.net (mail.0x20.net [217.69.76.211]) by mail.0x20.net (Postfix) with ESMTP id 05E496A601C; Mon, 11 Jun 2012 11:35:06 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.0x20.net Received: from mail.0x20.net ([217.69.76.211]) by mail.0x20.net (mail.0x20.net [217.69.76.211]) (amavisd-new, port 10024) with ESMTP id 24bQHtLUISWr; Mon, 11 Jun 2012 11:35:05 +0200 (CEST) Received: from e-new.0x20.net (mail.0x20.net [IPv6:2001:aa8:fffb:1::3]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.0x20.net (Postfix) with ESMTPS id AE46B6A6006; Mon, 11 Jun 2012 11:35:05 +0200 (CEST) Received: from e-new.0x20.net (localhost [127.0.0.1]) by e-new.0x20.net (8.14.5/8.14.5) with ESMTP id q5B9Z5lx063982; Mon, 11 Jun 2012 11:35:05 +0200 (CEST) (envelope-from lars@e-new.0x20.net) Received: (from lars@localhost) by e-new.0x20.net (8.14.5/8.14.5/Submit) id q5B9Z5oa063834; Mon, 11 Jun 2012 11:35:05 +0200 (CEST) (envelope-from lars) Date: Mon, 11 Jun 2012 11:35:05 +0200 From: Lars Engels To: Dag-Erling =?utf-8?B?U23DuHJncmF2?= Message-ID: <20120611093505.GN5592@e-new.0x20.net> References: <86r4tqotjo.fsf@ds4.des.no> <6E26E03B-8D1D-44D3-B94E-0552BE5CA894@FreeBSD.org> <20120610145351.GA1098@reks> <86ehpmp6xq.fsf@ds4.des.no> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="aKeOajaNu7w8cMvA" Content-Disposition: inline In-Reply-To: <86ehpmp6xq.fsf@ds4.des.no> X-Editor: VIM - Vi IMproved 7.3 X-Operation-System: FreeBSD 8.3-RELEASE-p2 User-Agent: Mutt/1.5.21 (2010-09-15) X-Mailman-Approved-At: Mon, 11 Jun 2012 11:35:35 +0000 Cc: Damian Weber , freebsd-security@freebsd.org, Gleb Kurtsou , "Simon L. B. Nielsen" Subject: Re: Default password hash X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 11 Jun 2012 09:35:07 -0000 --aKeOajaNu7w8cMvA Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Mon, Jun 11, 2012 at 10:51:45AM +0200, Dag-Erling Sm=C3=B8rgrav wrote: > Damian Weber writes: > > *collision* attacks are relatively easy these days, but against 1 MD5,= =20 > > not against 1000 times MD5 >=20 > I'm not talking about collision attacks, I'm talking about brute-forcing > hashes. >=20 > > there is a NIST hash competition running, the winner will soon be annou= nced > > (and it won't be SHA256 or SHA512 ;-) > > http://csrc.nist.gov/groups/ST/hash/timeline.html > > so my suggestion would be to use all of the finalists - especially > > the winner - for password hashing > > * BLAKE > > * Gr=C3=B8stl=20 > > * JH > > * Keccak > > * Skein > > see, for example, http://www.nist.gov/itl/csd/sha3_010511.cfm >=20 > There's a world of difference between switching the default to an > algorithm we already support and which is widely used by other operating > systems, and switching to a completely knew and untested algorithm. BTW Solaris 10 and 11 support our Blowfish algorithm, Solaris 10 >=3D 10/08 supports SHA256 and SHA512 and SHA256 was mad the default algorithm in Solaris 11. Some Linux variants support Blowfish and from glibc 2.7 on they have support for SHA256 and SHA512. So the least common denominator if we want to use a compatible format is SHA256/SHA512. --aKeOajaNu7w8cMvA Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.19 (FreeBSD) iEYEARECAAYFAk/Vu8kACgkQKc512sD3afjwPgCfejKC5+LB0Hbr6Md2NGoKCoB8 ctgAmwbE4CdEDBzm8pwcCX/SOvsm3RVF =9E9D -----END PGP SIGNATURE----- --aKeOajaNu7w8cMvA--