[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <f26cd0911002250836q3a82a8d6y5d3e10afa434bc13@mail.gmail.com>
Date: Thu, 25 Feb 2010 11:36:17 -0500
From: Dan Kaminsky <dan@...para.com>
To: Michael Neal Vasquez <mnv@...mni.princeton.edu>
Cc: full-disclosure <full-disclosure@...ts.grok.org.uk>
Subject: Re: EasyJet is storing user passwords in the clear
We agree completely on the 70%. Re, the 30%--
Salting makes the biggest difference on large datasets, just because even
for 1000 different users you're now working 1000 times faster. Algorithm
choice matters less. The speed difference between MD5 and SHA-1 isn't that
significant though:
$ openssl speed md5
Doing md5 for 3s on 16 size blocks: 2985670 md5's in 2.96s
Doing md5 for 3s on 64 size blocks: 2931714 md5's in 3.04s
Doing md5 for 3s on 256 size blocks: 2063380 md5's in 2.98s
Doing md5 for 3s on 1024 size blocks: 956809 md5's in 3.03s
Doing md5 for 3s on 8192 size blocks: 157650 md5's in 2.98s
$ openssl speed sha1
Doing sha1 for 3s on 16 size blocks: 3088016 sha1's in 2.98s
Doing sha1 for 3s on 64 size blocks: 2818497 sha1's in 3.00s
Doing sha1 for 3s on 256 size blocks: 1814907 sha1's in 3.01s
Doing sha1 for 3s on 1024 size blocks: 751942 sha1's in 2.98s
Doing sha1 for 3s on 8192 size blocks: 116496 sha1's in 2.98s
PBKDF2, which basically runs the hash function in a loop, can make a
difference. But at the end of the day, a leaked password database is bad
news, hashes or not.
On Thu, Feb 25, 2010 at 11:31 AM, Michael Neal Vasquez <
mnv@...mni.princeton.edu> wrote:
> If I reread your statement, and take it as "70% of people's passwords
> suck" -- I'd have to agree. I'd say though, for the remaining 30%,
> algorithm choice, even without salting, can make a difference. My password
> audits go much quicker when LM is enabled, vs NTLM. Same for MD5 vs SHA1.
>
>
> On Thu, Feb 25, 2010 at 9:07 AM, Dan Kaminsky <dan@...para.com> wrote:
>
>>
>>
>> On Thu, Feb 25, 2010 at 10:39 AM, Michael Neal Vasquez <
>> mnv@...mni.princeton.edu> wrote:
>>
>>> On Thu, Feb 25, 2010 at 8:05 AM, Dan Kaminsky <dan@...para.com> wrote:
>>>
>>>> Sai,
>>>>
>>>> I see where you're coming from, but what are the most recent
>>>> statistics on the effectiveness of hash cracking? Isn't it something like
>>>> 70% of the passwords in the field can be cracked with a minimal amount of
>>>> brute forcing?
>>>>
>>>>
>>>
>>> 70% ?
>>>
>>> Plain MD5 perhaps, but I don't think salted, or sha1, etc, have anywhere
>>> near such high success rates.
>>>
>>
>> The problem isn't in the algorithm -- it's in the passwords themselves.
>> Salting helps in that the attacker can't amortize the work effort across the
>> entire population, but at the end of the day, even PBKDF2 isn't going to do
>> much against 1234567890 and its ilk.
>>
>> To put it another way, if EasyJet *did* have a breach, they couldn't very
>> well say "It's OK, because the passwords were hashed".
>>
>
>
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists