Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:88863 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 92619 invoked from network); 18 Oct 2015 23:07:10 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 18 Oct 2015 23:07:10 -0000 Authentication-Results: pb1.pair.com header.from=korvinszanto@gmail.com; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=korvinszanto@gmail.com; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.220.50 as permitted sender) X-PHP-List-Original-Sender: korvinszanto@gmail.com X-Host-Fingerprint: 209.85.220.50 mail-pa0-f50.google.com Received: from [209.85.220.50] ([209.85.220.50:33216] helo=mail-pa0-f50.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id F8/27-06385-D1624265 for ; Sun, 18 Oct 2015 19:07:09 -0400 Received: by pabrc13 with SMTP id rc13so171177323pab.0 for ; Sun, 18 Oct 2015 16:07:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :content-type; bh=6zefXqbSlwVvAkmRAhvjSS/lUuFBxKCSqDvgG4pEscY=; b=fh4qlCSp9Jb1JVmhmYYG+NaR3vcb/MvqgnQU9dGw/apXEqqIWzAeXBG57xvapjSb8c gH79cAhy36ZA+umvWeXnprKXfmmjb712JKmip16l4ukJM4+KhUHQtn3KmIdFI3ZbkIHP rTtNXjGbnm0QfKHqUoehTfbRPZGdpW1n77BMndrYVBbsIeeOVKhWcZekoy5o5svbfqt9 sWCy7tisXoT+2xhDyAZQ4teBOzJfvoJXJPIg/3aBm2xKu/wYrsUq+/GEoHVDxB2NoH3R mJUODk9VBc6S6nSaI9QAgRGcK7a7gU7AS0xK/uz2I0Q0K3P8zSqDmNl8g4p0DmpZ7nX2 RqrQ== X-Received: by 10.66.147.104 with SMTP id tj8mr30659350pab.125.1445209626398; Sun, 18 Oct 2015 16:07:06 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: Date: Sun, 18 Oct 2015 23:06:56 +0000 Message-ID: To: Anthony Ferrara , "internals@lists.php.net" Content-Type: multipart/alternative; boundary=047d7b6dcd6e6858e3052269169e Subject: Re: [PHP-DEV] Password_hash salt generation refactor From: korvinszanto@gmail.com (Korvin Szanto) --047d7b6dcd6e6858e3052269169e Content-Type: text/plain; charset=UTF-8 +1 for 7.0.x security patch release, best effort sounds scary. On Sun, Oct 18, 2015 at 4:01 PM Anthony Ferrara wrote: > All, > > With PHP 7 comes random_bytes and random_int. This duplicates some of > the logic internally that password_hash uses to generate its salt. > > I would like to refactor this to unify generation. I've opened a PR > against master: https://github.com/php/php-src/pull/1585 > > I don't feel comfortable pulling against 7 this far into RC status. > Perhaps wait until after it goes gold? Or should this target 7.1? It's > not a big deal in either direction. Though it does add a side-effect, > where if it can't gather enough entropy it will throw an exception and > return failure (where prior it would simply make a "best effort". > > Thoughts? > > Anthony > > -- > PHP Internals - PHP Runtime Development Mailing List > To unsubscribe, visit: http://www.php.net/unsub.php > > --047d7b6dcd6e6858e3052269169e--