Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:121227 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 14710 invoked from network); 5 Oct 2023 00:12:44 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 5 Oct 2023 00:12:44 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 893EF18005C for ; Wed, 4 Oct 2023 17:12:43 -0700 (PDT) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=-0.0 required=5.0 tests=BAYES_20,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_PASS,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS8560 74.208.0.0/16 X-Spam-Virus: No X-Envelope-From: Received: from mout.perfora.net (mout.perfora.net [74.208.4.194]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Wed, 4 Oct 2023 17:12:43 -0700 (PDT) Received: from oxusgaltgw00.schlund.de ([10.72.72.46]) by mrelay.perfora.net (mreueus004 [74.208.5.2]) with ESMTPSA (Nemesis) id 1MNcUJ-1qzMu312gl-00P4co; Thu, 05 Oct 2023 02:12:40 +0200 Date: Wed, 4 Oct 2023 19:12:39 -0500 (CDT) To: Nicolas Grekas , =?UTF-8?Q?Tim_D=C3=BCsterhus?= Cc: PHP internals Message-ID: <91754969.1357324.1696464759882@email.ionos.com> In-Reply-To: References: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Priority: 3 Importance: Normal X-Mailer: Open-Xchange Mailer v7.10.6-Rev52 X-Originating-Client: open-xchange-appsuite X-Provags-ID: V03:K1:XY5bHm3t4c9zHAN3GrB6Rn5fkKrwtyhoe01RP7xtUaI+RU4yd5i /Bx8p9sFDF8faHERL7kT8ffOG+ux2U7h2HGGT2x8m2oKRI+SAx4Xk8APiUCjJFlBJPyp9Jp SvDHODB3tLCDPnJS5TaW5/PvYokFtzLEs3NLr0ATQ3t7hFlvlwWobbeLH7wLUx00PPcQmu5 y74qMGXh3n3mQBmb9xUBQ== UI-OutboundReport: notjunk:1;M01:P0:PR5/SiJJbHQ=;7TyGG4qKGLAgZ0rVstj+8yqQ2AE pFxitl7drrmjJKMhYRu+dGpsR+EUseoIWitc1UYgL/fh1n1ROJN/9OG8NZCOPkHhw40h48SCf gnsv1ekds28RBymPUxG5acSAFyuoCv/TwUznyS2aSEKBrq53pSyeW+I+6JitaeheOOLnUbdzX FPwwwvmOlB2ob7zKKisAZm05wMIKAl+8+0TS70bTvaz04NZb6YeVgggLirYv7708hBZ8C3wYS ZH0gq8HtwbWANlhsx1jth0MIwMEB9A4Q1pJgqLv0mumV0Y2GX0lksr+SrLA7yrUzok9Iifdnl yr1kp9MweNF16GGsp4GauvKcbttxo2ZMDGNOK5UDytTOuqfneHuxX31hHMO55N7KAudSzRaLL zR3zFQpI1KTI5RmdmbPFMbZWlDpUUH8PinDoORdhh5u1AP3DD2m92npIVr7Qv4liis+oYdwip s9nmEUUiDwZ1lHgey49l/ugAOdAfNLPT1/9bFeV3UdhXn2SI0G0aL4tauzFWwGr9sE2AY0Inz qTVkrkw0Bro5LcogCCW9VH9KIVd5xjZ2uNVaJAE6gIuAxbdf8verDZZc7a42iFJYqabOG/3un kHSsZwMLdKDF2uZj37gfTTuOf63FNuqzVG6bmIe19xLGRm+apY0zB4HzASWtT41SKHFEj2IzH TKeWb7jKPuFKHl3GknBZAYOCsOiRxqeMH2ANLkSCTp2nGfzSEwqPgJRgCulGB4myt+Be6waDV t51PmYMdrR4kqJEodvityKWFe+KA/exmOkJZLMOOW2KBAeu3DLFssWjNIpn0AY70QIsLpbfzT TmVF09DlEiTWnxWDRFziSL0nTweeHeABj9HtT26Vtj/qNPGCnMYTfw2770oXVN3jJBBHQYfnN qPWIN5cjCecb/Tg== Subject: Re: [PHP-DEV] [VOTE] Increasing the default BCrypt cost From: steve@tobtu.com > On 09/22/2023 2:04 AM CDT Nicolas Grekas wrote: > > > I was wondering if you considered also raising the Argon2 default cost? Has > this been discussed? > Argon2 defaults are actually quite high at a theoretical speed of ~1.3 kH/s/GPU (960,000,000,000/(64*1024^2)/(3*4-1) or in general bandwidth/(m*1024)/(3*t-1)). The actual speeds are likely half that or less because of GPU memory size being the limiting factor. Note "<10 kH/s/GPU" is considered good.