The SSSD password cache currently uses salted, iterated (5000 times) SHA-512. SHA-512 is designed for speed and is not an ideal password hash.
Investigate switching to a modern hash designed for password storage such as argon2 (or scrypt or bcrypt).
Ideally the digest or implementation should be tunable for a particular time cost (e.g. 0.2 seconds) and memory cost.
Cloned from Pagure issue: https://pagure.io/SSSD/sssd/issue/3446
The SSSD password cache currently uses salted, iterated (5000 times) SHA-512. SHA-512 is designed for speed and is not an ideal password hash.
Investigate switching to a modern hash designed for password storage such as argon2 (or scrypt or bcrypt). Ideally the digest or implementation should be tunable for a particular time cost (e.g. 0.2 seconds) and memory cost.
Comments
Comment from jhrozek at 2017-07-19 22:00:02
This sounds like a fine idea, but nothing we need to implement in a hurry.
It would make for a nice thesis topic perhaps?
Comment from jhrozek at 2017-07-19 22:00:21
Metadata Update from @jhrozek:
Comment from thalman at 2020-03-11 14:10:43
Metadata Update from @thalman:
Comment from pbrezina at 2020-03-11 14:11:30
Metadata Update from @pbrezina: