[Date Prev][Date Next]
Re: Revisiting the SHA1 default password hash
- To: Michael Ströder <firstname.lastname@example.org>, email@example.com
- Subject: Re: Revisiting the SHA1 default password hash
- From: Quanah Gibson-Mount <firstname.lastname@example.org>
- Date: Fri, 24 Feb 2017 12:34:09 -0800
- Content-disposition: inline
- In-reply-to: <WMemail@example.com>
- References: <B4A6086DCB7954D816BB8528@[192.168.1.30]> <firstname.lastname@example.org> <WMemail@example.com>
--On Friday, February 24, 2017 9:06 PM +0100 Michael Ströder
Quanah Gibson-Mount wrote:
I think it would be wise to update OpenLDAP to a different default for
We currently have the Contrib SHA2 module,
SHA-2 hashes with one round are also way too fast to be a good password
It may be time to move the SHA2 module into core,
Yes, but there should be something stronger.
Did you just skip entirely past the point where I said:
"but there has been some discussion of the limitations of the current SHA2
module in the past that would likely need addressing"
The point of that sentence was to note that there are issues with the
current SSHA2 module that would need fixing prior to moving it to core.
And yes, perhaps PBKDF2 should be in core as well. ;)
Packaged, certified, and supported LDAP solutions powered by OpenLDAP: