tech-userlevel archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: crypt_r()?

> All modern password hashing algorithms use a large memory buffers and
> will attempt to scale them according to system ressources.

So merely attempting to log in *requires* a major fraction of the
amount of memory the system had when the password was set?

That sounds like a recipe for disaster.  It is a complete fail for
heterogenous environments where the same hash needs to be checkable on
widely disparate hardware, where a small machine may not have the
resources to perform the check _at all_.  It is also a total fail when
trying to log in to a machine to deal with severe memory pressure.
(Perhaps fortunately, password-hash checking does not apply to ssh, or
at least doesn't have to.)

> This applies at least to ARGON2 (which we include) and scrypt.

Then perhaps it's just as well I haven't been tracking -current,
because I would consider that sort of resource grabbing a "must be
fixed before this is even minimally usable" bug.

> Thi is an essential hardening step against FPGA/custom ASIC
> implementations.

I can't help feeling that there should be better ways to do that.  I
like the idea of resistance to such things, but, for at least my
purposes, the ability to check passwords without major resource
consumption is a routine desire; resistance against an attacker willing
to invest in custom hardware is not.

Personally, my lines of defense would be (a) keeping the hashes secret
and (b) using good passwords.  I would also suggest using a private
hashing algorithm, but that depends on having the expertise to pick a
unique-enough good-enough algorithm and implement it, leading me to say
it is probably suitable only for particularly high-value targets or
hardcore geeks like me.  I'd guess that probably a majority of the
people on this list are competent to add an algorithm, though perhaps
not to choose/design one - though I would also guess we are very much a
minority among NetBSD users in that respect.


Home | Main Index | Thread Index | Old Index