lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 02 Sep 2014 20:46:31 -0400 From: Bill Cox <waywardgeek@...hershed.org> To: discussions@...sword-hashing.net Subject: Re: [PHC] A review per day - PolyPassHash -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 09/01/2014 04:25 PM, Bill Cox wrote: > PolyPassHash is a very cool idea. To authenticate any password, > you have to prove you know at least N correct user/password > combinations. Once you've done this, you can authenticate passwords > as they come in. > > This falls into the "other" category. It might be a useful > bolt-on for an authentication server along with a decent password > hashing scheme. I am really glad the author submitted it so we > could all enjoy reading about the algorithm. > > However, I feel it is far enough removed from being a password > hashing scheme that it doesn't belong among the eventual "winners". > If we can give it an honorable mention, that would be fine :-) > > Since this is the place where I list my gripes, I will mention that > I had to do a lot more debugging work to get PolyPassHash working > than the others. However, it's no big deal. > > I think that's all I really have to say about PolyPassHash, other > than to thank the author for the cool paper. Thanks! > > Bill > Just in case anyone was thinking I passed on the review of PolyPassHash because I thought reviewing it would be distasteful or anything, that's not it at all. I just don't know how exactly to evaluate it. It's too different. For example, it likes to return the same hash regardless of password, IIRC, but it's not a bug! Something about initializing the database of password hashes... I forget, and I would like to keep it that way! I consider it one of these proof-of-concept things, rather than production ready code that needs big geeks to tear it apart looking for bugs and weaknesses. However, if they get to the point of where they need big geeks to tear apart their code, I'll be glad to help :-) Bill -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJUBmTkAAoJEAcQZQdOpZUZq4gP/RCqqOGl8F+TgpsJsR7NdQkg 4DLBtDSBnZo+sVWKYRNxfgMUKDknSobfFF7hh2sdbpFPKEKk6FGKC/Vn6is0mNC8 yQ+3u+enQz3z5m89yde41Minlh7yaHdI48k94v77cnE/X1eIL7mM2eiJGtru4YxH E6/bTJohcMXQPWUSuAHzFZHdsxYPjJ8lSZsA/Dt2LfQR+/V9qcYlD325ZYSWY/b/ zGRDYeKFuwBWHZZ+Rjg5/CjaB8sh5Ys0h+JIrRXKmGHvpTO0YPk+tfjAPlQYwk4v WXOIwbFt8IJQCmVhpSHlyfQoGy0lnI4qY7dbXqfYJU9MlWrrDyZ7mWUWIBW8V65U qZ0MWd6TjAaISvWzPzq1EO699Y6ykOwDU3xbZSKbYI89O+CHL4YrBErHwnDIHD5b 4bYSOSysP7hsoPb22Xg9uslz4LyaATwGpCV/OE0OjWEG6BFHfNlNz0DmFY8B18+7 oqtszvY1LMlufMxJr9H1ZvJqmez21LS0oCn4z4qugyurVdJQAr/CQkLwjK5kSsV2 ESiusOocgEPFy27yrIyZ6FxNmr518HaFJZ514lwQoyUtIk9SRkZNojNgeW/KFfan wFHE/0Opzcy56+EQhm8lyKPOQCPW+vfnOTMBYKGyOpmHFZjpEtNbjZd6iomdf16Q yLvWSDZSsJw/BHXtDs7M =f/E3 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists