Re: [ldapext] [ldap] Re: draft-stroeder-hashed-userpassword-values-01

Andrew Findlay <andrew.findlay@skills-1st.co.uk> Fri, 15 March 2013 10:18 UTC

Return-Path: <andrew.findlay@skills-1st.co.uk>
X-Original-To: ldapext@ietfa.amsl.com
Delivered-To: ldapext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 12FC621F8B75 for <ldapext@ietfa.amsl.com>; Fri, 15 Mar 2013 03:18:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.3
X-Spam-Level:
X-Spam-Status: No, score=-2.3 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, MIME_8BIT_HEADER=0.3, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hs7P42DS10pr for <ldapext@ietfa.amsl.com>; Fri, 15 Mar 2013 03:18:44 -0700 (PDT)
Received: from kea.ourshack.com (kea.ourshack.com [IPv6:2001:470:1f15:20::201]) by ietfa.amsl.com (Postfix) with ESMTP id D840C21F8B71 for <ldapext@ietf.org>; Fri, 15 Mar 2013 03:18:43 -0700 (PDT)
Received: from 2.b.0.9.d.6.e.f.f.f.a.6.1.2.2.0.1.e.7.f.0.d.8.0.0.b.8.0.1.0.0.2.ip6.arpa ([2001:8b0:8d0:f7e1:221:6aff:fe6d:90b2] helo=slab.skills-1st.co.uk) by kea.ourshack.com with esmtpsa (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.72) (envelope-from <andrew.findlay@skills-1st.co.uk>) id 1UGRij-00016i-DT; Fri, 15 Mar 2013 10:18:41 +0000
Received: from andrew by slab.skills-1st.co.uk with local (Exim 4.80.1) (envelope-from <andrew.findlay@skills-1st.co.uk>) id 1UGRii-0005VK-S0; Fri, 15 Mar 2013 10:18:40 +0000
Date: Fri, 15 Mar 2013 10:18:40 +0000
From: Andrew Findlay <andrew.findlay@skills-1st.co.uk>
To: Michael Ströder <michael@stroeder.com>
Message-ID: <20130315101840.GQ18706@slab.skills-1st.co.uk>
References: <5103F924.2070800@stroeder.com> <CABBgLkcnK7WfthFOBD5Esfz+g1izcKoGgtxzKKDntc0i=E7LOQ@mail.gmail.com> <510782A6.7050209@stroeder.com> <3ED81CD8-59DA-482E-8AFA-C68E53A62067@isode.com> <51410020.4020800@stroeder.com> <20130314001901.GN18706@slab.skills-1st.co.uk> <5141F560.6040805@highlandsun.com> <5142171C.6090807@stroeder.com> <51421EC9.6060502@highlandsun.com> <514222B0.9090107@stroeder.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <514222B0.9090107@stroeder.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
Sender: Andrew Findlay <andrew.findlay@skills-1st.co.uk>
Cc: "ldap@umich.edu" <ldap@umich.edu>, ldapext <ldapext@ietf.org>
Subject: Re: [ldapext] [ldap] Re: draft-stroeder-hashed-userpassword-values-01
X-BeenThere: ldapext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: LDAP Extension Working Group <ldapext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ldapext>, <mailto:ldapext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ldapext>
List-Post: <mailto:ldapext@ietf.org>
List-Help: <mailto:ldapext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ldapext>, <mailto:ldapext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Mar 2013 10:18:45 -0000

On Thu, Mar 14, 2013 at 08:19:12PM +0100, Michael Ströder wrote:

> >>      userpasswordvalue  = cleartext-password / prefix hashed-password
> > 
> > I think you should replace "hashed-password" with "scheme-specific data" and
> > stop there.
> 
> That's a conclusion of your opinion. But I want to describe the *order* of
> password and salt used by any server I saw using the scheme.

Why not separate the description of the data from the overall syntax?
It will be easier to read that way, and much more obvious that the whole
thing is extensible and a bit informal.

userPassword has Octet String syntax, so in principle the value is
<scheme name in curly brackets> <arbitrary data>

A separate section of the doc could then describe (or refer to) the formats
of all the commonly-used storage schemes. I was about to call them 'hash
schemes' but that is wrong, as some servers support reversible encryption
schemes as well as hashes.


On a slight tangent, a rough guide to the current strength of various hash
schemes can be found on hashcat's front page:

	http://hashcat.net/oclhashcat-plus/

The table at the bottom gives the brute-force attack rate in crypts/sec
using a single PC with a good (mid-range gaming) graphics engine.
Numbers range from about 4k c/s for bcrypt up to 7500M c/2 for NTLM.
It does not explicitly list figures for SSHA and SMD5 but I suspect the
'sha512crypt $6$' figure is indicative at 12k c/s.

Andrew
-- 
-----------------------------------------------------------------------
|                 From Andrew Findlay, Skills 1st Ltd                 |
| Consultant in large-scale systems, networks, and directory services |
|     http://www.skills-1st.co.uk/                +44 1628 782565     |
-----------------------------------------------------------------------