Return-Path: X-Original-To: apmail-apr-dev-archive@www.apache.org Delivered-To: apmail-apr-dev-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 73E229DA5 for ; Mon, 2 Jul 2012 19:46:47 +0000 (UTC) Received: (qmail 94554 invoked by uid 500); 2 Jul 2012 19:46:47 -0000 Delivered-To: apmail-apr-dev-archive@apr.apache.org Received: (qmail 94472 invoked by uid 500); 2 Jul 2012 19:46:47 -0000 Mailing-List: contact dev-help@apr.apache.org; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Id: Delivered-To: mailing list dev@apr.apache.org Received: (qmail 94463 invoked by uid 99); 2 Jul 2012 19:46:47 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 02 Jul 2012 19:46:47 +0000 X-ASF-Spam-Status: No, hits=-2.3 required=5.0 tests=RCVD_IN_DNSWL_MED,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (athena.apache.org: local policy) Received: from [188.40.99.202] (HELO eru.sfritsch.de) (188.40.99.202) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 02 Jul 2012 19:46:40 +0000 Received: from [10.1.1.6] (helo=k.localnet) by eru.sfritsch.de with esmtp (Exim 4.72) (envelope-from ) id 1SlmZf-0007DD-M9; Mon, 02 Jul 2012 21:46:19 +0200 From: Stefan Fritsch To: Ben Laurie Subject: Re: Choosing a stronger password hash algorithm Date: Mon, 2 Jul 2012 21:46:19 +0200 User-Agent: KMail/1.13.7 (Linux/3.2.0-3-amd64; KDE/4.8.4; x86_64; ; ) References: <201207022102.12181.sf@sfritsch.de> In-Reply-To: Cc: dev@apr.apache.org MIME-Version: 1.0 Content-Type: Text/Plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Message-Id: <201207022146.19376.sf@sfritsch.de> X-Virus-Checked: Checked by ClamAV on apache.org On Monday 02 July 2012, Ben Laurie wrote: > FWIW, I am not super-keen on this particular move. Whilst bcrypt is > certainly an improvement, I am wary of relying on Blowfish - it is > not a mainstream cipher and is not subject to the kind of scrutiny > that, say, AES or SHA-2/3 are. > > If we are going to change, then we should change to a mechanism > that is subject to ongoing cryptanalysis. bcrypt has the advantage that it currently does not give much speed-up of GPUs versus CPUs. So brute-forcing is more difficult than e.g. for glibc's sha256 or sha512 based algorithms. And we can't just arbitrarily increase the number of rounds because that would make httpd prone to DoS attacks. My rationale for bcrypt is here: http://mail-archives.apache.org/mod_mbox/apr- dev/201206.mbox/%3C201206232242.42669.sf%40sfritsch.de%3E Your comments on that would be welcome. Due to Poul-Henning Kamp's declaration that md5crypt is insecure, there is some renewed interest in this field. Maybe there will be a new algorithm soon that is both difficult to brute-force on GPUs and based on something standard like AES or SHA*. Maybe we could add bcrypt for now and if something better appears, then add that as well? Cheers, Stefan