Skip to content

fix(defaults): increase PASSES to a value greater than 10 for security #18

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 1 commit into from
Closed

Conversation

Evrey
Copy link

@Evrey Evrey commented Oct 6, 2016

Also documents the change and adds a reference to the attack paper.

Would it be reasonable to also make Argon2::new fail with too few passes? While it would help enforcing better Argon2 configurations out in the wild, this would be a breaking change. Even a test breaking change for the already broken existing *_kat tests.

Also documents the change and adds a reference to the attack paper.
@bryant
Copy link
Owner

bryant commented Dec 29, 2016

That attack paper's been around for a while, but the default time cost in https://github.com/p-h-c/phc-winner-argon2 is still set to 3. Would you mind raising this on their issue tracker too? I think they could offer some perspective on the legitimacy of this attack.

Thanks!

@vks
Copy link
Contributor

vks commented Aug 3, 2017

According to P-H-C/phc-winner-argon2#182, this can be closed?

@Evrey
Copy link
Author

Evrey commented Aug 4, 2017

Seems like it.

@nicktimko
Copy link

Amusing that Wikipedia linked to these issues mentioning "Argon2 engineers do not recommend that user implementations of Argon2 adjust the number of passes to be 10 or more."

@bryant
Copy link
Owner

bryant commented Aug 23, 2017

Alright, let's close this.

@bryant bryant closed this Aug 23, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants