A hole in crypt_blowfish
A hole in crypt_blowfish
Posted Jun 22, 2011 19:28 UTC (Wed) by martinfick (subscriber, #4455)Parent article: A hole in crypt_blowfish
Seems like another alternative would be to simply lazily update the stored hash on login since the unencrypted password is available then. This way users would not be forced to change their passwords.
Posted Jun 22, 2011 20:01 UTC (Wed)
by mjthayer (guest, #39183)
[Link] (9 responses)
Posted Jun 22, 2011 20:27 UTC (Wed)
by dark (guest, #8483)
[Link] (8 responses)
The users will have to get their passwords changed, but this will be limited to users who were affected by the bug, and there's no window of opportunity for attackers.
One would hope this approach is coupled with a plan to phase out the restriction, though :)
Posted Jun 22, 2011 22:18 UTC (Wed)
by bgilbert (subscriber, #4738)
[Link] (7 responses)
Posted Jun 23, 2011 4:39 UTC (Thu)
by nirbheek (subscriber, #54111)
[Link] (6 responses)
Posted Jun 23, 2011 4:41 UTC (Thu)
by nirbheek (subscriber, #54111)
[Link]
Posted Jun 23, 2011 10:18 UTC (Thu)
by job (guest, #670)
[Link] (4 responses)
Posted Jun 23, 2011 21:15 UTC (Thu)
by solardiz (guest, #35993)
[Link] (3 responses)
Also, see comments by iabervon in here. And discussion on how to make it possible to upgrade transparently or safely: http://www.openwall.com/lists/oss-security/2011/06/23/3
Posted Jun 23, 2011 23:44 UTC (Thu)
by dlang (guest, #313)
[Link] (2 responses)
the fact that there are alternate inputs isn't the problem.
a hash is only considered broken if you can predict what inputs will produce a particular output.
In this case, that is exactly what happens, this bug means that someone can test far fewer inputs when trying to find one that matches the output, because you can predict that a large number of inputs will all produce the same output, and therefor only test one of them.
Posted Jun 24, 2011 0:08 UTC (Fri)
by solardiz (guest, #35993)
[Link] (1 responses)
Posted Jun 26, 2011 11:28 UTC (Sun)
by job (guest, #670)
[Link]
A hole in crypt_blowfish
If I understood correctly, someone who had managed to grab an old copy of the password database and who used it to find one of the "alternative" versions of an affected password might be able to use it to find the real one more easily.
There's a more drastic solution: don't allow characters with the high bit set in passwords at all. Deny login to any attempts to log in with such passwords.
A hole in crypt_blowfish
The restriction could exclude passwords that were set after the bug had been fixed.
A hole in crypt_blowfish
A hole in crypt_blowfish
A hole in crypt_blowfish
A hole in crypt_blowfish
A hole in crypt_blowfish
A hole in crypt_blowfish
A hole in crypt_blowfish
A hole in crypt_blowfish