[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
> All modern password hashing algorithms use a large memory buffers and
> will attempt to scale them according to system ressources.
So merely attempting to log in *requires* a major fraction of the
amount of memory the system had when the password was set?
That sounds like a recipe for disaster. It is a complete fail for
heterogenous environments where the same hash needs to be checkable on
widely disparate hardware, where a small machine may not have the
resources to perform the check _at all_. It is also a total fail when
trying to log in to a machine to deal with severe memory pressure.
(Perhaps fortunately, password-hash checking does not apply to ssh, or
at least doesn't have to.)
> This applies at least to ARGON2 (which we include) and scrypt.
Then perhaps it's just as well I haven't been tracking -current,
because I would consider that sort of resource grabbing a "must be
fixed before this is even minimally usable" bug.
> Thi is an essential hardening step against FPGA/custom ASIC
I can't help feeling that there should be better ways to do that. I
like the idea of resistance to such things, but, for at least my
purposes, the ability to check passwords without major resource
consumption is a routine desire; resistance against an attacker willing
to invest in custom hardware is not.
Personally, my lines of defense would be (a) keeping the hashes secret
and (b) using good passwords. I would also suggest using a private
hashing algorithm, but that depends on having the expertise to pick a
unique-enough good-enough algorithm and implement it, leading me to say
it is probably suitable only for particularly high-value targets or
hardcore geeks like me. I'd guess that probably a majority of the
people on this list are competent to add an algorithm, though perhaps
not to choose/design one - though I would also guess we are very much a
minority among NetBSD users in that respect.
Main Index |
Thread Index |