Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Command line parameter for bcrypt_pbkdf password cracking defenses, e.g. iteration counts #22

Open
nealmcb opened this issue Jul 30, 2019 · 1 comment

Comments

@nealmcb
Copy link

nealmcb commented Jul 30, 2019

As noted e.g. at Recommended # of iterations when using PKBDF2-SHA256?, it is important to take steps to protect the password for the secret key from brute force attacks. It appears that the signify code uses bcrypt_pbkdf to do this, but the parameters like iteration count used aren't noted in the documentation. It should be possible to increase the count over time.

Can the number of iterations/rounds be modified via the command-line tool? If not can that feature be added?

@nealmcb nealmcb changed the title Command line parameter for bcrypt_pbkdf password cracking defenses ala iteration counts for Command line parameter for bcrypt_pbkdf password cracking defenses, e.g. iteration counts Jul 30, 2019
@aperezdc
Copy link
Owner

From the point of view of this Signify project, the one and only goal is to take the code from OpenBSD (where it originated and is maintained) and apply the minimum set of modifications needed to make it run on GNU/Linux—also, I do not have more spare time than for doing that, sorry!

New features should be added by submitting patches to the OpenBSD project, and once they have been included there I will be more than happy to update the source code here for the portable version.

Let's keep this issue open nevertheless, in case someone else is looking for ideas that could be contributed back to the OpenBSD project.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants