Bitcoin Forum
May 13, 2024, 05:26:50 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Quite a few people have been hacked. Do you use good password hashing protocols?  (Read 103 times)
WWP (OP)
Newbie
*
Offline Offline

Activity: 5
Merit: 0


View Profile
February 21, 2018, 12:26:03 AM
 #1

Someone has been hacked: https://bitcointalk.org/index.php?topic=1546435.0

I've also seem to have been hacked. So I started a new life.

According to: https://www.owasp.org/index.php/Password_Storage_Cheat_Sheet#Use_a_cryptographically_strong_credential-specific_salt and: https://www.keylength.com/ I'm reasonable to assume I've used a strong enough password for this time and age - on a properly configured forum.

Password strength requires two components:

- The service provider to use appropriate password hashing schemes. See the OWASP.org link.

- The user to use a password of appropriate entropy for the time and age. See the KeyLength.com link.

If your user doesn't want to be hacked on your forum, how many bits of entropy should his password consist of, according to your algorithm and the rules of math?
1715621210
Hero Member
*
Offline Offline

Posts: 1715621210

View Profile Personal Message (Offline)

Ignore
1715621210
Reply with quote  #2

1715621210
Report to moderator
"Your bitcoin is secured in a way that is physically impossible for others to access, no matter for what reason, no matter how good the excuse, no matter a majority of miners, no matter what." -- Greg Maxwell
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715621210
Hero Member
*
Offline Offline

Posts: 1715621210

View Profile Personal Message (Offline)

Ignore
1715621210
Reply with quote  #2

1715621210
Report to moderator
SaltySpitoon
Legendary
*
Offline Offline

Activity: 2590
Merit: 2154


Welcome to the SaltySpitoon, how Tough are ya?


View Profile
February 21, 2018, 12:40:47 AM
 #2

this is from a post regarding a database breach a while ago

-snip-
Passwords were hashed very strongly. Each password is hashed with 7500 rounds of sha256crypt and a 12-byte random salt (per password).
-snip-
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!