hi!

Thanks for the patches! Very welcome :)

On Mon, Jul 18, 2011 at 12:51 AM, Solar Designer <so...@openwall.com> wrote:

> Yes, but this is not terribly important.  In practice, "$2a$" is almost
> the same as "$2y$".  For passwords that don't contain the '\xff'
> character (which is not even valid in UTF-8 sequences), these two are
> 100% equivalent.  For realistic passwords that do contain this
> character, I had one "hit" in 150,000+ such passwords tested:
>
> http://www.openwall.com/lists/oss-security/2011/07/08/1
>
> So this is negligible, and even for the affected passwords (where "$2y$"
> and "$2a$" hashes differ by more than just the prefix) this only matters
> if those password hashes are ever migrated to other systems (non-PHP).
>
> The reason why I went for this is that I consider the security advantage
> of avoiding easy collisions with the buggy hashes non-negligible.

Makes full sense.

>> perhaps a note mentioning the '$2x$' prefix for "transitioning users
>> with passwords that contain non-ASCII characters with the 8th bit set".
>
> We need to be careful here such that no one starts using this for newly
> set passwords.  This bit of documentation should be available to those
> few who actually need it (I expect that most sites won't care), but
> maybe it should not be on the function crypt() documentation page.
>
>> Obviously, any documentation change in this regard will need to be
>> pending on the version these patches get rolled into...
>
> Yes - need to release PHP versions with this code first.

I think we should push this patch to 5.3 now as well, so it will be in
5.3.7, it is important enough.

Cheers,
-- 
Pierre

@pierrejoye | http://blog.thepimp.net | http://www.libgd.org

--
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to