From: Ahmad Fatoum <a.fat...@barebox.org>

It's well known that MD5 and SHA1 aren't suitable password hashing
algorithms. Let's alert users to that fact by selecting
HAS_INSECURE_DEFAULTS.

Signed-off-by: Ahmad Fatoum <a.fat...@barebox.org>
---
v1 -> v2:
  - unchanged
---
 security/Kconfig | 11 +++++++++++
 1 file changed, 11 insertions(+)

diff --git a/security/Kconfig b/security/Kconfig
index 95c062201acf..b9447e73fc6f 100644
--- a/security/Kconfig
+++ b/security/Kconfig
@@ -43,10 +43,21 @@ choice
 config PASSWD_SUM_MD5
        bool "MD5"
        select DIGEST_MD5_GENERIC
+       select HAS_INSECURE_DEFAULTS
+       help
+         MD5 had been widely used historically as a cryptographic hash 
function,
+         but has been found to suffer from extensive vulnerabilities.
+         Use of MD5 to hash passwords is strongly discouraged.
 
 config PASSWD_SUM_SHA1
        bool "SHA1"
        select DIGEST_SHA1_GENERIC
+       select HAS_INSECURE_DEFAULTS
+       help
+         SHA1 had been widely used historically as a cryptographic hash 
function,
+         but has since been cryptographically broken.
+         SHA-1 was designed for speed and thus use as password hash is strongly
+         discouraged as it's easier for an attacker to brute force.
 
 config PASSWD_SUM_SHA256
        bool "SHA256"
-- 
2.39.5


Reply via email to