Re: Methodology for increasing the number of PBKDF2 iterations

2017-02-12 Thread Martin Koistinen
. The up-side is PBKDF2 is significantly better than was previously calculated. Enjoy! On Monday, January 30, 2017 at 2:09:56 PM UTC-5, Martin Koistinen wrote: > > *IMPORTANT NOTICE:* I've just made an important change to the Google Docs > Sheet here: > https://docs.google.com/sp

Re: Methodology for increasing the number of PBKDF2 iterations

2017-01-30 Thread Martin Koistinen
*IMPORTANT NOTICE:* I've just made an important change to the Google Docs Sheet here: https://docs.google.com/spreadsheets/d/16_KdYAW03sb86-w_AFFnM79IaTWQ7Ugx4T0VMfGteTM/edit?usp=sharing Realizing that most security policies make requirements such as "At least 1 character must be a numeral",

Re: Methodology for increasing the number of PBKDF2 iterations

2017-01-24 Thread Martin Koistinen
Updated the sheet with more recent GPU pricing. On Thursday, January 19, 2017 at 1:19:57 PM UTC-5, Martin Koistinen wrote: > > All, I've converted my worksheet into a Google Docs Sheet here: > https://docs.google.com/spreadsheets/d/16_KdYAW03sb86-w_AFFnM79IaTWQ7Ugx4T0VMfGteTM/edit?us

Re: Methodology for increasing the number of PBKDF2 iterations

2017-01-19 Thread Martin Koistinen
to tweak for your system and security policy. Comments and suggestions are welcome and if appropriate, I'll make edits accordingly. On Wednesday, January 18, 2017 at 12:32:55 PM UTC-5, Martin Koistinen wrote: > > Tim, I've sent you a model I've assembled recently for your review. I'll

Re: Methodology for increasing the number of PBKDF2 iterations

2017-01-18 Thread Martin Koistinen
00,000 on master (targeting Django 2.0). It > would be nice to determine a guideline for how to determine future > increases. > > On Monday, January 16, 2017 at 12:55:25 PM UTC-5, Martin Koistinen wrote: >> >> Tobias, >> >> Thanks for the comprehensive benchmark

Re: Methodology for increasing the number of PBKDF2 iterations

2017-01-16 Thread Martin Koistinen
Tobias, Thanks for the comprehensive benchmarking and summary of the situation! I agree on all points, but I'd like to add, that we should err on the side of high iterations for the simple fact that most developers would sooner accept the risk of a DoS long before the risk of compromised user

Re: Methodology for increasing the number of PBKDF2 iterations

2017-01-09 Thread Martin Koistinen
own Python and doing so without OpenSSL. I'm guessing that > any operating system Python will have the OpenSSL bindings. Or is that a > bad assumption? > > On Wednesday, January 4, 2017 at 2:13:09 PM UTC-5, Martin Koistinen wrote: >> >> I think this is a pretty solid guess. Be

Re: Methodology for increasing the number of PBKDF2 iterations

2017-01-05 Thread Martin Koistinen
at 2:13:09 PM UTC-5, Martin Koistinen wrote: > > I think this is a pretty solid guess. Bear in mind this was a direct > install from Python.org. > > The important thing here is, this demonstrates that we cannot just assume > that all Python 3 installs have a "fast

Re: Methodology for increasing the number of PBKDF2 iterations

2017-01-04 Thread Martin Koistinen
I think this is a pretty solid guess. Bear in mind this was a direct install from Python.org. The important thing here is, this demonstrates that we cannot just assume that all Python 3 installs have a "fast" PBKDF2 implementation =/ On Wednesday, January 4, 2017 at 11:33:17 AM UTC-5, Tobias

Re: Methodology for increasing the number of PBKDF2 iterations

2017-01-03 Thread Martin Koistinen
t;pbkdf2_sha256" with 100,000 iterations, verification takes, on average, 0.2751s What am I missing here? On Tuesday, January 3, 2017 at 12:45:42 PM UTC-5, Martin Koistinen wrote: > > I think the best practice is to set the iterations as high as you can > tolerate without adversely

Re: Methodology for increasing the number of PBKDF2 iterations

2017-01-03 Thread Martin Koistinen
t;pbkdf2_sha256" with 100,000 iterations, verification takes, on average, 0.2751s What am I missing here? On Tuesday, January 3, 2017 at 12:45:42 PM UTC-5, Martin Koistinen wrote: > > I think the best practice is to set the iterations as high as you can > tolerate without adversely

Re: Methodology for increasing the number of PBKDF2 iterations

2017-01-03 Thread Martin Koistinen
I think the best practice is to set the iterations as high as you can tolerate without adversely affecting the user experience as they log-in. Iteration numbers as high as 200,000 for SHA-256 or even more are not unheard of these days. Without looking at an application's password expiration