Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#71393 - [shadow] Use yescrypt hash for passwords for improve security
Attached to Project:
Arch Linux
Opened by leazar (leazar) - Tuesday, 29 June 2021, 09:04 GMT
Last edited by Andreas Radke (AndyRTR) - Wednesday, 30 June 2021, 05:33 GMT
Opened by leazar (leazar) - Tuesday, 29 June 2021, 09:04 GMT
Last edited by Andreas Radke (AndyRTR) - Wednesday, 30 June 2021, 05:33 GMT
|
DetailsSHA512 is designed to be fast (which makes it easier to brute-force), while yescrypt is designed to resist password cracking because it's computationally expensive and hard on memory & GPU. Fedora is going to use it in its next release (https://fedoraproject.org/wiki/Changes/yescrypt_as_default_hashing_method_for_shadow).
Please consider changing the default hashing method for passwords to yescrypt. |
This task depends upon
[1] https://src.fedoraproject.org/rpms/shadow-utils/blob/rawhide/f/shadow-4.8.1-yescrypt-support.patch
Good news: shadow 4.9 has been released with yescrypt support [4], there is no need to patch it anymore. However, the package has not been updated yet.
Ideally, the shadow and pambase could be updated simultaneously in order to use yescrypt as the default password hashing method.
[1]: https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/
[2]: https://tches.iacr.org/index.php/TCHES/article/view/8675
[3]: https://www.mdpi.com/2410-387X/1/2/10
[4]: https://github.com/shadow-maint/shadow/releases/tag/v4.9
I quickly tested locally with yescrypt & sha512, and works for login and changing passwords as expected. Let me know if there's anything I can do to help push this through?
Many thanks!
Update: I tested rolling back shadow to the official package, but with 'yescrypt' still enabled in /etc/pam.d/passwd and it seems that this patch isn't necessary - yescrypt still works without the change in the shadow PKGBUILD. Given that, it's hard for me to say how useful this change to shadow is...