Changes between Version 1 and Version 2 of PasswordHash
- Timestamp:
- Feb 16, 2018, 2:56:41 PM (7 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
PasswordHash
v1 v2 6 6 }}} 7 7 This is no longer considered to be secure for storage of passwords. Brute force attacks on md5 hashed passwords are possible due to the speed that md5 hashes can be computed. As a result, in the event that the database of a BOINC project were compromised, the passwords would be at risk of being cracked. 8 9 Due to the fact that the md5 hash of the password is computed on the client (when a user is attaching to a project), any change made to the hash algorithm will take several years before the md5 hash can be fully sunset. As a result, it is important to get started on this change.10 11 This change will need to adhere to the follow goals:12 13 1. A old client should be able to register a user and/or attach a user to a old project14 15 1. A old client should be able to register a user and/or attach a user to a updated project16 17 1. A updated client should be able to register a user and/or attach a user to a old project18 19 1. A updated client should be able to register a user and/or attach a user to a updated project20 21 1. A updated project should have all passwords stored using the new hash algorithm22 8 23 9 = New Hashing Function = … … 76 62 77 63 = Changes = 78 The client will not require any changes nor will external systems that use the Web RPCs. 64 The client will not require any changes nor will external systems that use the Web RPCs. 79 65 80 66 The website will need to be changed in order to add the new logic to validate and rehash a password and to use the new hash algorithm when stored in the database.