[Dovecot] Storing passwords encrypted... bcrypt?
Charles Marcus
CMarcus at Media-Brokers.com
Thu Jan 5 18:14:20 EET 2012
On 2012-01-05 10:28 AM, Michael Orlitzky <michael at orlitzky.com> wrote:
> On 01/05/12 06:26, Charles Marcus wrote:
>>> To prevent rainbow table attacks, salt your passwords. You can make them
>>> a little bit more difficult in plenty of ways, but salt is the
>>> /solution/.
>> Go read that link (you obviously didn't yet, because he claims that
>> salting passwords is next to *useless*...
> He doesn't claim that,
Ummm... yes, he does... from tfa:
"Salts Will Not Help You
It’s important to note that salts are useless for preventing dictionary
attacks or brute force attacks. You can use huge salts or many salts or
hand-harvested, shade-grown, organic Himalayan pink salt. It doesn’t
affect how fast an attacker can try a candidate password, given the hash
and the salt from your database.
Salt or no, if you’re using a general-purpose hash function designed for
speed you’re well and truly effed."
> but he's a crackpot anyway.
Why? I asked because I'm genuinely unsure (don't know enough about the
innards of the different encryption methods), and that's why I asked.
Simply saying he's a crackpot means nothing.
Also...
> Use a slow algorithm (others already mentioned bcrypt)to prevent
> brute-force search,
Actually, that (bcrypt) is precisely what *the author of the article*
(the one who you are saying is a crackpot) is suggesting to use - I
guess you didn't even bother to read it or else you'd know that, so why
bother commenting?
> and use salt to prevent pre-computed lookups. Anyone who tells you
> otherwise can probably be ignored. Extraordinary claims require
> extraordinary evidence.
I don't see it as an extraordinary claim, and anyone who goes around
claiming someone else is a crackpot without evidence to support the
claim is just yammering.
>>> You realize they're just walking around with a $400 post-it note with
>>> the password written on it, right?
>> Nope, you are wrong - as I have patiently explained before. They do not
>> *need* to write their password down.
> They have them written down on their phones. If someone gets a hold of
> the phone, he can just read the password off of it.
<sigh> No, they don't, your claim is baseless and without merit.
Most people have never even known what their password *is*, much less
written it down, because as I said (more than once), *I* set up their
email clients (workstations, home computers and phones) *for them*.
--
Best regards,
Charles
More information about the dovecot
mailing list