Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:75676 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 17521 invoked from network); 17 Jul 2014 21:12:59 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 17 Jul 2014 21:12:59 -0000 Authentication-Results: pb1.pair.com header.from=yohgaki@gmail.com; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=yohgaki@gmail.com; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.215.52 as permitted sender) X-PHP-List-Original-Sender: yohgaki@gmail.com X-Host-Fingerprint: 209.85.215.52 mail-la0-f52.google.com Received: from [209.85.215.52] ([209.85.215.52:45376] helo=mail-la0-f52.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 4C/74-18859-95C38C35 for ; Thu, 17 Jul 2014 17:12:58 -0400 Received: by mail-la0-f52.google.com with SMTP id e16so2157783lan.25 for ; Thu, 17 Jul 2014 14:12:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; bh=Ny9A/44toDbLZ0IKcZ9+1843bnkbbvSsKzPIXXXzt60=; b=HoFvm9SsYHZxT+W4zazL9JTJjcddHHe0MBkkyLPQO2rM5pSjMOhnK/o09I8wUc8mf4 w6BVqlyjP/wgY4xy5/6pcmm5e90HH/sSmWrEtJxv0LUIJvyBzg4ubrfZA2IpvzI4++SW nzIkP6/65BpSbUiqNOSryiTIrKWg7cA8yubVkKePvvKyF8TqWP+sLlAvq3YCOcHzVBEI HdA0AEXbWkUsweE/ti83ZozRwGzHV0HjBhWMT9zJzd6+HW2dJcfKXPvT0qb9I5Wk+rup Rmzd1vHl3HDLG/pcn4F21N/386o47g0Vm9EP5ugIZCfRqz1v7u1nLriszR0urPEhb967 b9lQ== X-Received: by 10.112.40.161 with SMTP id y1mr2472217lbk.61.1405631575204; Thu, 17 Jul 2014 14:12:55 -0700 (PDT) MIME-Version: 1.0 Sender: yohgaki@gmail.com Received: by 10.112.128.202 with HTTP; Thu, 17 Jul 2014 14:12:14 -0700 (PDT) In-Reply-To: References: Date: Fri, 18 Jul 2014 06:12:14 +0900 X-Google-Sender-Auth: 5JIm9MiZNp0dCN39T10DELFB41Q Message-ID: To: Anthony Ferrara Cc: Adam Harvey , Tjerk Meesters , Sara Golemon , "internals@lists.php.net" Content-Type: multipart/alternative; boundary=001a11345cc2b9aa9d04fe6a1a95 Subject: Re: [PHP-DEV] crypt() BC issue From: yohgaki@ohgaki.net (Yasuo Ohgaki) --001a11345cc2b9aa9d04fe6a1a95 Content-Type: text/plain; charset=UTF-8 Hi all, On Fri, Jul 18, 2014 at 4:38 AM, Anthony Ferrara wrote: > We internalized the algorithms in 5.3.2 at least partially because the > system provided libraries were inconsistent at best (hence why many > but not all 5.2 systems don't support bcrypt, it depended on the build > of libcrypt you linked against). > > Please don't make us re-live this inconsistency... Especially when it > won't really solve the problem. > OK for me. I suggested to close the bug as 'wont fix' in first place. > Regarding password_verify() accepting crypt(), I consider it an > implementation detail that it works. I know the RFC specifies it, but > it specifies it not as a conceptual fact (that it will always be no > more than a reason to be there), but more as an explanation for what > it's currently doing. I would not rely on that fact. It may work > today. It may work tomorrow, but it shouldn't be documented as such > (as it's the complement of password_hash(), not the complement of > crypt()). > > > As far as I'm aware, the only reason for not marking crypt() > > E_DEPRECATED right now is for compatibility with external systems, and > > as far as those go, changing a default won't effect anything. > > I want to reinforce that point, because it's spot on the money: > > I think crypt should live on. password_hash should be the way new > systems are built, sure. But as you mention external systems, crypt > should be a standard way of interacting with them (heck, that's what > the lib was designed for). It shouldn't be a "if you're not using > password_hash(), you're doing it wrong". It's "password_hash() should > solve the majority of use-cases, but if you have a different need, > there are other options". > I agree. crypt() should be available as normal function. Anthony, do you have suggestion for removing 72 char restriction of PASSWORD_BCRYPT? Regards, -- Yasuo Ohgaki yohgaki@ohgaki.net --001a11345cc2b9aa9d04fe6a1a95--