Success

User tests: Successful: Unsuccessful:

avatar elinw
elinw
15 Aug 2013

There is a longer explanation of the background of this in the feature tracker
http://joomlacode.org/gf/project/joomla/tracker/?action=TrackerItemEdit&tracker_item_id=31561&start=0

d217c05 28 Jun 2013 avatar elinw wp
508897f 28 Jun 2013 avatar elinw wp
9161641 9 Jul 2013 avatar elinw cs
avatar elinw elinw - open - 15 Aug 2013
avatar nicksavov
nicksavov - comment - 25 Aug 2013

Hi Elin,

Looks like this is out-of-sync, unfortunately. Could you update it to master?

avatar coolacid
coolacid - comment - 28 Aug 2013

Reviewed the patch - looks clean. I couldn't see any major issues with the code. Made a few optimization comments to elin offline.

avatar mbabker
mbabker - comment - 6 Sep 2013

Can you rebase onto master please?

avatar mbabker
mbabker - comment - 7 Sep 2013

I think my merging of the two-factor auth patch threw you out of sync again, the merge button is greyed out.

avatar coolacid
coolacid - comment - 7 Sep 2013

There was some comments somewhere about Using SHA512 vs SHA256 for fall back.

Even though SHA512 is faster then SHA256, we're not doing it often enough to make it really required.

Second, this is a fall back, not a "we need faster speed". If they are worried about speed, use bcrypt.

Third, IANACE (I am not a crypto expert), but given that SHA512 uses a block size of 64 bits. Thus, As I understand it, Anything less then 8 character passwords would require padding, this could yield to other attacks. SHA256 uses a block size of 32 bits, so at 8 character passwords, you'd have at least two runs instead of the one.

(EDIT)
Duh, we should be using a salt > 8 chars, so you would have at least 2 rounds on a 64bit block size. But, the lower block size would be better in the long run as there would be more rounds.

Add a Comment

Login with GitHub to post a comment