1 |
On 2022-07-25 15:35, Peter Stuge wrote:
|
2 |
|
3 |
> Mikhail Koliada wrote: |
4 |
>> This idea has been fluctuating in my head for quite a while given |
5 |
>> that the migration had happened a while ago [0] and some other |
6 |
>> major distributions have already adopted yescrypt as their default algo |
7 |
>> by now [1]. |
8 |
> |
9 |
> Please only do that based on proven merit and nothing else. |
10 |
|
11 |
https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/
|
12 |
, https://www.password-hashing.net/ , the fact we still us the default
|
13 |
number of rounds (i.e. 5000) with SHA512 which is *ridiculously* weak
|
14 |
for modern hardware, lack of Argon2 support in libxcrypt for the time
|
15 |
being due to upstream having decided to wait for an official RFC. You
|
16 |
can probably find more yourself if you look.
|
17 |
|
18 |
--
|
19 |
Marecki |