Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:62958 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 5185 invoked from network); 12 Sep 2012 14:03:02 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 12 Sep 2012 14:03:02 -0000 Authentication-Results: pb1.pair.com header.from=ircmaxell@gmail.com; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=ircmaxell@gmail.com; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.215.42 as permitted sender) X-PHP-List-Original-Sender: ircmaxell@gmail.com X-Host-Fingerprint: 209.85.215.42 mail-lpp01m010-f42.google.com Received: from [209.85.215.42] ([209.85.215.42:60136] helo=mail-lpp01m010-f42.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 77/6A-42492-51690505 for ; Wed, 12 Sep 2012 10:03:02 -0400 Received: by lahl5 with SMTP id l5so1161658lah.29 for ; Wed, 12 Sep 2012 07:02:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=Dq1Sm0Q+4+6vfTl+0zLSnkqKEt+WXt9zbeFI1i8+dt8=; b=q339jM+Uqe3nYGCNPdCVcGSPSAdKo7albg6YrUwliogflu+RCxxeP2TiElGkiI1Rqb pXaVR3Qkfpd0SapF4kK6J1fJH3JFaXcfligUGOwiUqtP0enMkHMyeqaQ5+FYxW9D3iWW TtAvz2g78Pu/SJB7jgOgEv8AAAV+CrmzHmn9ZWteYgjmJB3GXptAtTa0grm3K5yE1Jy7 5Yk02De5I6ROZtPzk1kTQTT9Teqv5lE9vmH1Nt0Pw3SUTr2iuHi5ET6tQBZW5gkjxxeO xLO93gjiZUDYLH5xRCDAHK7/PW8qU/X8SmNjAdouIgzctftSRa9d+i/0iPa7FrIeDbhW AJCw== MIME-Version: 1.0 Received: by 10.112.31.197 with SMTP id c5mr7405840lbi.50.1347458578157; Wed, 12 Sep 2012 07:02:58 -0700 (PDT) Received: by 10.114.22.1 with HTTP; Wed, 12 Sep 2012 07:02:58 -0700 (PDT) In-Reply-To: References: Date: Wed, 12 Sep 2012 10:02:58 -0400 Message-ID: To: Hannes Magnusson Cc: internals@lists.php.net Content-Type: multipart/alternative; boundary=f46d040168c7e6923404c981a5fd Subject: Re: [PHP-DEV] [VOTE] Add simplified password hashing API From: ircmaxell@gmail.com (Anthony Ferrara) --f46d040168c7e6923404c981a5fd Content-Type: text/plain; charset=ISO-8859-1 Hello all, I've closed the vote and it's been accepted with a vote total of 19:0, unanimous. I've moved the RFC into Accepted. I'm going to add the remaining tests, and then move it into master later. As for the PECL extension route, I'll work on splitting it into a PECl extension for 5.3/5.4 at the same time. Thanks all, Anthony On Tue, Sep 11, 2012 at 7:58 AM, Anthony Ferrara wrote: > Hannes, > > > First off, this has been discussed on the list for literally months. Why >> > wait until the day before voting can end before bringing this up? >> >> So commenting is strictly forbidden during votes? > > > Not in the least. Just pointing out that this discussion could have been > better if it was started much earlier (prior to the time and effort being > put into it). Just pointing it out. There's nothing "wrong" (procedurally) > about bringing it up now, just that it would have been nice to hear this > point earlier in the discussion... > > >> > Secondly, the main reason for not developing this as an extension is >> that >> > there's really no benefit to it. There are little to no performance >> gains to >> > be had by the C implementation. It can live quite as easily as a PHP >> > library. >> >> The benefit is that it can be tested properly and bugs discovered and >> ironed out first. >> > > I'm not so sure about that. If it was widely adopted as an extension, > sure. But I would predict a very limited adoption. Almost purely academic. > The reason is that there's no advantage to doing it in C other than to > provide a working API for those who don't understand how to build it (or > realize the benefits thereto). Those are the same people who wouldn't be > able to install a PECL extension (know-how or access). And projects who > realize this is needed are likely already using one of the many libraries > available. > > So I'm not sure the install rate would be anywhere high enough to work any > significant issues out. Additionally, there are testing phases for the > release that would hopefully catch any major issues prior to 5.5 going > gold... > > >> This is not the sort of thing you want to get security bug reports the >> day after its released in core. >> > > Sure. Which is why I've been going around looking for security reviews > (posted to the crypt-dev list on openwall, and to > security.stackexchange.com). > > >> If your ego is big enough you can guarantee you have tested this >> thoroughly and want it to become the recommended way.. You have to be >> damn sure you don't fuck it up. >> > > I want to say that this is really unfair. By saying it this way you've > pushed me into a corner. I disagree that your suggestion would have a > result of any significant gain in security. Yet I cannot disagree with you > without coming across as an egotist now that you said it that way. Please > try to keep things civil without setting up traps to try to prove your > point. I don't appreciate this remark at all... > > >> This is exactly the sort of thing that doesn't need to be developed in >> the core tree, but can later be merged in once proven successful. >> > > As indicated before, if that's the case, then it would never be merged. > Because this would never be successful as a stand alone PECL module. The > primary reason for adding it is so that people who don't know any better > would be able to use a secure API. That is the antithesis of a PECL > extension. > > >> >> Especially considering the patch is unfinished. >> > >> > >> > Aside from adding a few more tests, what's unfinished? If you're >> referring >> > to the line in the RFC, I just haven't updated it. The patch has been >> worked >> > on and is in a place where I'd be comfortable submitting it... >> >> The test suite seems very limited, and the code seems to be waiting >> for more algorithms to be implemented. >> > > Yes, the test suite needs to be expanded. I tested it additionally with > the PHPUnit tests that I wrote for the PHP fallback, so it's been tested > fairly well... I just need to expand the phpt test suite included in core... > > As far as more algorithms, right now there's no reason to add more > algorithms. The whole point was to never add anything but the strongest > algorithm available. Which today is bcrypt. But as time goes on, and better > algorithms become available, the API is designed so that they can be > implemented. But today, there's no other algorithm that should be > implemented. (SCrypt is a candidate, but since it lacks crypt(3) bindings, > and is still very young, it's inclusion isn't prudent at this point). > > There's a section to the RFC for adding new algorithms as time goes on: > https://wiki.php.net/rfc/password_hash#updating_password_default > > Anthony > --f46d040168c7e6923404c981a5fd--