Re: WineHQ database compromise

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Oct 12, 2011, at 5:58 AM, Jeremy White wrote:

> The current form of that is a fairly complex salted sha 256 string.  However,
> that started in bugzilla version 4, which was released only this year.
> 
> For passwords encrypted in bugzilla prior to that, a simple crypt() was used.
> I haven't yet looked at the bugzilla code to determine if it was salted or not,
> or exactly how that crypt() was called.  The encrypted text is roughly the same
> length as a 64 bit DES encryption.
> 
> The appdb uses the sha1() mysql function which is a straight forward sha1sum.
> 
> I won't claim to be a cryptography expert, as I'm not.  My back of the envelope
> analysis is that if you have a moderately complex password, you will likely
> be safe from any straight forward attempts to crack your password.  You may still
> be at risk to an extended brute force attack.  But here my ignorance kicks in;
> I don't know where the curve of password length + complexity matches the curve
> of 'time required to brute force an sha1'.

I'm not a cryptographer either, but note that SHA-1 is used by Git and others for its speed.  For hashing passwords, this is a bug, not a feature -- checking passwords should be slow rather than quick.  One hash function designed for passwords is bcrypt().

Josh






[Index of Archives]     [Gimp for Windows]     [Red Hat]     [Samba]     [Yosemite Camping]     [Graphics Cards]     [Wine Home]

  Powered by Linux