Closed (fixed)
Project:
Drupal core
Version:
8.0.x-dev
Component:
user system
Priority:
Normal
Category:
Task
Assigned:
Unassigned
Issue tags:
Reporter:
Created:
29 Jun 2011 at 13:04 UTC
Updated:
29 Jul 2014 at 19:44 UTC
Jump to comment: Most recent, Most recent file
Comments
Comment #1
pwolanin commentedHere are 2 trivial patches to make that change for 7 and 8.
Comment #2
pwolanin commentedoops - those were both the same - here's the one for D7.
Comment #3
pwolanin commentedComment #4
grendzy commentedIncrementing the hash periodically makes sense, but we should sanity-check the execution time. 2^14 rounds takes about 65ms on a core 2 duo. Do we have a target in mind for the wall time? One concern is clock rates have not changed much since this was originally committed in 2008. Moore's law has given us more cores, but this is the wrong kind of asymmetry - attackers can crack in parallel, but an individual login cannot run _password_crypt() in parallel.
pwolanin didn't mention it, but the count is stored embedded in the hash - so old passwords will continue to work (and will be re-hashed automatically as users log in).
Comment #5
pwolanin commentedI think bringing it into the 50-100 ms range is good
Comment #6
heine commentedComment #7
grendzy commented+1. I repeated the test on a core 3.2 GHz i7, and 2^14 rounds was down to 19ms.
Comment #8
webchickJust curious, but is there a reason not to just jack that to 25 or something to keep us set for awhile? Performance?
Comment #9
pwolanin commented@webchick - this number is power of 2. So increasing D8 by 2, increases the # iterations by a factor of 4.
Increasing by another 10 would increase a factor of 1024, so logins would take at least 10-20 seconds to just check the hash.
Comment #10
webchickGotcha. Well that's no good then. :)
Committed to #1 to 8.x and #2 7.x. Thanks!