Re: [jdev] plaintext passwords hack

2009-12-18 Thread Tomasz Sterna
Dnia 2009-12-17, czw o godzinie 16:58 +0100, Simon Josefsson pisze: Sure, but caching the hashed values scales better. Remember, we are not talking about just one hash call, typically there is 4096 hash iterations when deriving the keys from a password in SCRAM. Oh. So you really meant that

Re: [jdev] plaintext passwords hack

2009-12-18 Thread Alexander Holler
Am 18.12.2009 02:33, schrieb Kurt Zeilenga: On Dec 17, 2009, at 9:55 AM, Simon Josefsson wrote: Low iteration counts removes one nice features of SCRAM (mitigating dictionary attacks on stolen hash databases). It's only a nice feature if you can take advantage of it. If you need to

Re: [jdev] plaintext passwords hack

2009-12-18 Thread Alexander Holler
Am 18.12.2009 14:58, schrieb Alexander Holler: Storing a hash for every mechanism will not work. E.g. for DIGEST-MD5 the server has to hash the clear-text password with a value the client provides. So the server needs the clear-text password. And if the server is able to get the clear-text

Re: [jdev] plaintext passwords hack

2009-12-18 Thread Simon Josefsson
Alexander Holler hol...@ahsoftware.de writes: Am 18.12.2009 02:33, schrieb Kurt Zeilenga: On Dec 17, 2009, at 9:55 AM, Simon Josefsson wrote: Low iteration counts removes one nice features of SCRAM (mitigating dictionary attacks on stolen hash databases). It's only a nice feature if you

Re: [jdev] plaintext passwords hack

2009-12-18 Thread Alexander Holler
Am 18.12.2009 16:42, schrieb Simon Josefsson: Storing a hash for every mechanism will not work. E.g. for DIGEST-MD5 the server has to hash the clear-text password with a value the client provides. That is true for CRAM-MD5, but not for DIGEST-MD5 and SCRAM-MD5. With the latter two mechanisms,

Re: [jdev] plaintext passwords hack

2009-12-18 Thread Peter Saint-Andre
On 12/18/09 8:07 AM, Alexander Holler wrote: Am 18.12.2009 14:58, schrieb Alexander Holler: Storing a hash for every mechanism will not work. E.g. for DIGEST-MD5 the server has to hash the clear-text password with a value the client provides. So the server needs the clear-text password. And if

Re: [jdev] plaintext passwords hack

2009-12-18 Thread Dave Cridland
On Fri Dec 18 15:41:39 2009, Peter Saint-Andre wrote: On 12/18/09 8:07 AM, Alexander Holler wrote: Am 18.12.2009 14:58, schrieb Alexander Holler: Storing a hash for every mechanism will not work. E.g. for DIGEST-MD5 the server has to hash the clear-text password with a value the client

Re: [jdev] plaintext passwords hack

2009-12-18 Thread Peter Saint-Andre
On 12/18/09 9:17 AM, Dave Cridland wrote: On Fri Dec 18 15:41:39 2009, Peter Saint-Andre wrote: On 12/18/09 8:07 AM, Alexander Holler wrote: Am 18.12.2009 14:58, schrieb Alexander Holler: Storing a hash for every mechanism will not work. E.g. for DIGEST-MD5 the server has to hash the

Re: [jdev] plaintext passwords hack

2009-12-17 Thread Simon Josefsson
Peter Saint-Andre stpe...@stpeter.im writes: On 12/16/09 9:03 AM, Simon Tennant (Buddycloud) wrote: I'm curious what the community makes of the recent news http://www.techcrunch.com/2009/12/14/rockyou-hack-security-myspace-facebook-passwords/ given SASL's cleartext password storage? It seems

Re: [jdev] plaintext passwords hack

2009-12-17 Thread Tomasz Sterna
Dnia 2009-12-17, czw o godzinie 14:35 +0100, Simon Josefsson pisze: If you don't store the hashed password for SCRAM, you need to burn CPU time for every login to derive the SCRAM hash keys. That doesn't scale well. Why do you say so? It scales well vertically by CPU upgrade, and

Re: [jdev] plaintext passwords hack

2009-12-17 Thread Kurt Zeilenga
On Dec 17, 2009, at 5:35 AM, Simon Josefsson wrote: If you don't store the hashed password for SCRAM, you need to burn CPU time for every login to derive the SCRAM hash keys. That doesn't scale well. If you ONLY store the hash keys, you limit which password-based mechanisms can be used.

Re: [jdev] plaintext passwords hack

2009-12-17 Thread Jonathan Dickinson
Subject: Re: [jdev] plaintext passwords hack Peter Saint-Andre stpe...@stpeter.im writes: On 12/16/09 9:03 AM, Simon Tennant (Buddycloud) wrote: I'm curious what the community makes of the recent news http://www.techcrunch.com/2009/12/14/rockyou-hack-security-myspace-facebook-passwords/ given

Re: [jdev] plaintext passwords hack

2009-12-17 Thread Dave Cridland
On Thu Dec 17 15:48:14 2009, Jonathan Dickinson wrote: Sorry for not conforming to the list standards, I am on my mobile. Logins taking a long time is advantageous, remember we are not a primitive/chatty protocol like HTTP; so burning CPU cycles during a login is a VERY small problem;

Re: [jdev] plaintext passwords hack

2009-12-17 Thread Simon Josefsson
Kurt Zeilenga kurt.zeile...@isode.com writes: On Dec 17, 2009, at 5:35 AM, Simon Josefsson wrote: If you don't store the hashed password for SCRAM, you need to burn CPU time for every login to derive the SCRAM hash keys. That doesn't scale well. If you ONLY store the hash keys, you limit

Re: [jdev] plaintext passwords hack

2009-12-17 Thread Simon Josefsson
Tomasz Sterna to...@xiaoka.com writes: Dnia 2009-12-17, czw o godzinie 14:35 +0100, Simon Josefsson pisze: If you don't store the hashed password for SCRAM, you need to burn CPU time for every login to derive the SCRAM hash keys. That doesn't scale well. Why do you say so? It scales well

Re: [jdev] plaintext passwords hack

2009-12-17 Thread Peter Saint-Andre
On 12/17/09 6:47 AM, Kurt Zeilenga wrote: On Dec 17, 2009, at 5:35 AM, Simon Josefsson wrote: If you don't store the hashed password for SCRAM, you need to burn CPU time for every login to derive the SCRAM hash keys. That doesn't scale well. If you ONLY store the hash keys, you limit

Re: [jdev] plaintext passwords hack

2009-12-17 Thread Simon Josefsson
Peter Saint-Andre stpe...@stpeter.im writes: On 12/17/09 6:47 AM, Kurt Zeilenga wrote: On Dec 17, 2009, at 5:35 AM, Simon Josefsson wrote: If you don't store the hashed password for SCRAM, you need to burn CPU time for every login to derive the SCRAM hash keys. That doesn't scale well.

Re: [jdev] plaintext passwords hack

2009-12-17 Thread Peter Saint-Andre
On 12/17/09 9:10 AM, Simon Josefsson wrote: Peter Saint-Andre stpe...@stpeter.im writes: On 12/17/09 6:47 AM, Kurt Zeilenga wrote: On Dec 17, 2009, at 5:35 AM, Simon Josefsson wrote: If you don't store the hashed password for SCRAM, you need to burn CPU time for every login to derive the

Re: [jdev] plaintext passwords hack

2009-12-17 Thread Kurt Zeilenga
On Dec 17, 2009, at 7:58 AM, Simon Josefsson wrote: Tomasz Sterna to...@xiaoka.com writes: Dnia 2009-12-17, czw o godzinie 14:35 +0100, Simon Josefsson pisze: If you don't store the hashed password for SCRAM, you need to burn CPU time for every login to derive the SCRAM hash keys. That

Re: [jdev] plaintext passwords hack

2009-12-17 Thread Simon Josefsson
Kurt Zeilenga kurt.zeile...@isode.com writes: On Dec 17, 2009, at 7:58 AM, Simon Josefsson wrote: Tomasz Sterna to...@xiaoka.com writes: Dnia 2009-12-17, czw o godzinie 14:35 +0100, Simon Josefsson pisze: If you don't store the hashed password for SCRAM, you need to burn CPU time for

Re: [jdev] plaintext passwords hack

2009-12-17 Thread Simon Josefsson
Peter Saint-Andre stpe...@stpeter.im writes: Agreed. That's the main reason we won't deploy hashed-only on the backend plus SCRAM-only on the wire at jabber.org. So will you 1) not support SCRAM at all, or 2) derive the hash keys from the plaintext passwords during authentication, or 3)

Re: [jdev] plaintext passwords hack

2009-12-17 Thread Peter Saint-Andre
On 12/17/09 11:03 AM, Simon Josefsson wrote: Peter Saint-Andre stpe...@stpeter.im writes: Agreed. That's the main reason we won't deploy hashed-only on the backend plus SCRAM-only on the wire at jabber.org. So will you 1) not support SCRAM at all, or 2) derive the hash keys from the

Re: [jdev] plaintext passwords hack

2009-12-17 Thread Kurt Zeilenga
On Dec 17, 2009, at 9:55 AM, Simon Josefsson wrote: Low iteration counts removes one nice features of SCRAM (mitigating dictionary attacks on stolen hash databases). It's only a nice feature if you can take advantage of it. If you need to support multiple password mechanisms, each either

Re: [jdev] plaintext passwords hack

2009-12-17 Thread Simon Josefsson
Kurt Zeilenga kurt.zeile...@isode.com writes: On Dec 17, 2009, at 9:55 AM, Simon Josefsson wrote: Low iteration counts removes one nice features of SCRAM (mitigating dictionary attacks on stolen hash databases). It's only a nice feature if you can take advantage of it. If you need to

[jdev] plaintext passwords hack

2009-12-16 Thread Simon Tennant (Buddycloud)
I'm curious what the community makes of the recent news http://www.techcrunch.com/2009/12/14/rockyou-hack-security-myspace-facebook-passwords/ given SASL's cleartext password storage? It seems like a monster breech. Are we, as XMPP network operators, headed to a similar compromise as larger

Re: [jdev] plaintext passwords hack

2009-12-16 Thread Peter Saint-Andre
On 12/16/09 9:03 AM, Simon Tennant (Buddycloud) wrote: I'm curious what the community makes of the recent news http://www.techcrunch.com/2009/12/14/rockyou-hack-security-myspace-facebook-passwords/ given SASL's cleartext password storage? It seems like a monster breech. This topic is more

Re: [jdev] plaintext passwords hack

2009-12-16 Thread Tobias Markmann
On 17.12.09 00:56, Peter Saint-Andre wrote: And even if you do have hashed passwords, if someone breaks into your machine then it's not that much work to de-hash them all. It just looks scarier if they're in cleartext to start with. That more or less depends on what you store in your

Re: [jdev] plaintext passwords hack

2009-12-16 Thread Kurt Zeilenga
On Dec 16, 2009, at 4:17 PM, Tobias Markmann wrote: On 17.12.09 00:56, Peter Saint-Andre wrote: And even if you do have hashed passwords, if someone breaks into your machine then it's not that much work to de-hash them all. It just looks scarier if they're in cleartext to start with. That

Re: [jdev] plaintext passwords hack

2009-12-16 Thread Mihael Pranjić
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 2009-12-17 01:43, Kurt Zeilenga wrote: On Dec 16, 2009, at 4:17 PM, Tobias Markmann wrote: On 17.12.09 00:56, Peter Saint-Andre wrote: And even if you do have hashed passwords, if someone breaks into your machine then it's not that much

Re: [jdev] plaintext passwords hack

2009-12-16 Thread Peter Saint-Andre
On 12/16/09 6:12 PM, Mihael Pranjić wrote: For a start you should really have you server very well secured. Very restriced access to anything, not letting mysql server or whatever to be accessed by anything else than localhost. No root ssh login, only certificate login, and so on and so on...