dlmarion commented on issue #2700:
URL: https://github.com/apache/accumulo/issues/2700#issuecomment-1135821742

   > I don't want to do anything custom.
   
   To be clear I wasn't doing anything custom, `PBKDF2WithHmacSHA512` is a JCA 
supported algorithm. Looking at 
[CODEC-133](https://issues.apache.org/jira/browse/CODEC-133), the commons-codec 
classes implement the Linux crypt algorithm, but I'm not quite sure of it's 
lineage. There are several things mentioned in that ticket that seem to be 
merged together.
   
   > Something else to keep in mind: faster hashing makes brute force attacks 
more efficient. The fact that sha512crypt is slower isn't necessarily a bad 
thing. It would be nice if it didn't use as much CPU, though.
   
   Agreed, my test performed 1000 iterations to match what the commons codec 
code is doing by default. I don't think we are providing commons-codec with any 
number of iterations. NIST SP800-63B suggest doing 10,000 iterations, it says:
   
   > For PBKDF2, the cost factor is an iteration count: the more times the 
PBKDF2 function is iterated, the longer it takes to compute the password hash. 
Therefore, the iteration count SHOULD be as large as verification server 
performance will allow, typically at least 10,000 iterations.
   
   So, my test is faster doing an apples-to-apples comparison, but would be 
slower when performing 10,000 iterations. We would still need the caching, IMO, 
since we are currently checking that the passwords match on each API call.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to