Hi all,

On Fri, Jul 18, 2014 at 4:38 AM, Anthony Ferrara <ircmax...@gmail.com>
wrote:

> We internalized the algorithms in 5.3.2 at least partially because the
> system provided libraries were inconsistent at best (hence why many
> but not all 5.2 systems don't support bcrypt, it depended on the build
> of libcrypt you linked against).
>
> Please don't make us re-live this inconsistency... Especially when it
> won't really solve the problem.
>

OK for me. I suggested to close the bug as 'wont fix' in first place.


> Regarding password_verify() accepting crypt(), I consider it an
> implementation detail that it works. I know the RFC specifies it, but
> it specifies it not as a conceptual fact (that it will always be no
> more than a reason to be there), but more as an explanation for what
> it's currently doing. I would not rely on that fact. It may work
> today. It may work tomorrow, but it shouldn't be documented as such
> (as it's the complement of password_hash(), not the complement of
> crypt()).
>
> > As far as I'm aware, the only reason for not marking crypt()
> > E_DEPRECATED right now is for compatibility with external systems, and
> > as far as those go, changing a default won't effect anything.
>
> I want to reinforce that point, because it's spot on the money:
>
> I think crypt should live on. password_hash should be the way new
> systems are built, sure. But as you mention external systems, crypt
> should be a standard way of interacting with them (heck, that's what
> the lib was designed for). It shouldn't be a "if you're not using
> password_hash(), you're doing it wrong". It's "password_hash() should
> solve the majority of use-cases, but if you have a different need,
> there are other options".
>

I agree. crypt() should be available as normal function.

Anthony, do you have suggestion for removing 72 char restriction of
PASSWORD_BCRYPT?

Regards,

--
Yasuo Ohgaki
yohg...@ohgaki.net

Reply via email to