[9897] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Digital Unix 4 protected password database.

daemon@ATHENA.MIT.EDU (der Mouse)
Fri Mar 12 15:38:56 1999

Date: 	Wed, 10 Mar 1999 17:44:40 -0500
Reply-To: der Mouse <mouse@RODENTS.MONTREAL.QC.CA>
From: der Mouse <mouse@RODENTS.MONTREAL.QC.CA>
To: BUGTRAQ@NETSPACE.ORG

> I once posted a better algorithm than this [...]... but it never got
> adopted, and anyway, MD5 or SHA1 is a much better bet.

Years ago, I did an MD5-based crypt(3) for NetBSD.  I've been using it
ever since.  I believe it is significantly better for several reasons.
One, of course, is that it's nonstandard and hence not vulnerable to
stock crack-alikes - but quite aside from that, it has benefits:

- MD5 is of clearer US export status than DES (even encryption-only DES
   engines can be used for data secrecy if you use CFB or OFB).

- The salt is large enough for the foreseeable future (128 bits).

- The round count is a parameter and is stored as part of the hash
   (meaning, there's no compatability issue involved with raising this
   as CPUs get faster).

- The hash format is extensible (it begins with a version number).

Of course, *any* hash except the "standard" traditional one may
introduce compatability problems if it's shared with NIS (nee YP) or
moral equivalent.

I will be happy to send a copy of the code, or a text description of
the algorithm, to anyone who wants one.

					der Mouse

			       mouse@rodents.montreal.qc.ca
		     7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B

home help back first fref pref prev next nref lref last post