lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <484525017.20150424185325@gmail.com> Date: Fri, 24 Apr 2015 18:53:25 +0200 From: Krisztián Pintér <pinterkr@...il.com> To: Sascha Schmidt <sascha.schmidt@...-weimar.de> CC: discussions@...sword-hashing.net Subject: Re: [PHC] Client-side hashing (was side-channel stuff) Sascha Schmidt (at Friday, April 24, 2015, 6:34:04 PM): > 2015-04-24 18:12 GMT+02:00 Krisztián Pintér <pinterkr@...il.com>: >> expiration yes, but it is not reckless. it is merely an inconvenience. >> and we are not talking about months here. we are talking about years. > I'm pretty sure that this is a common time span for at least some scenarios. moore's law says 3% increase per month, 20% in half year. if our security margin is so low we can't afford that, we are screwed anyway, and it is time to ditch password based identification. > I just personally have a great aversion of forgotten password routines > when it comes to usability and security. Maybe I just haven't seen a > good one yet. i agree that security is effectively nonexistent. but improving it is another story. launch the PRPC. as far as usability goes, i see no problem resetting a password after a year. i do it for some sites 3-4 times a year, minor annoyance. maybe i just got used to it.
Powered by blists - more mailing lists