Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps | Demo | Docs | Install
  1. Cloudron Forum
  2. Discuss
  3. Cloudron Password Hash Algorithm

Cloudron Password Hash Algorithm

Scheduled Pinned Locked Moved Discuss
securitypassword
13 Posts 5 Posters 1.3k Views 6 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • marioM Offline
    marioM Offline
    mario
    App Dev
    wrote on last edited by mario
    #3

    Oh my, oh my, the world is coming to an end!

    Please stop spreading panic. PBKDF2-SHA1 is not the same as SHA1. SHA1 has collisions - big deal.

    @mehdi and I nicely explained to you in chat why this is not the issue and why there's no need for immediate action AT ALL.

    Please stop scaring the users for no real reason without understanding the underlying problem. Thanks!

    ? 1 Reply Last reply
    3
    • marioM mario

      Oh my, oh my, the world is coming to an end!

      Please stop spreading panic. PBKDF2-SHA1 is not the same as SHA1. SHA1 has collisions - big deal.

      @mehdi and I nicely explained to you in chat why this is not the issue and why there's no need for immediate action AT ALL.

      Please stop scaring the users for no real reason without understanding the underlying problem. Thanks!

      ? Offline
      ? Offline
      A Former User
      wrote on last edited by
      #4

      @mario said in Critical: Cloudron Password Hash Algorithm Must Be Updated Immediately:

      PKBDF2-SHA1 is not the same as SHA1

      PBKDF...
      https://en.wikipedia.org/wiki/PBKDF2

      marioM 1 Reply Last reply
      -1
      • ? A Former User

        @mario said in Critical: Cloudron Password Hash Algorithm Must Be Updated Immediately:

        PKBDF2-SHA1 is not the same as SHA1

        PBKDF...
        https://en.wikipedia.org/wiki/PBKDF2

        marioM Offline
        marioM Offline
        mario
        App Dev
        wrote on last edited by mario
        #5

        @Hillside502 why are you linking me to a wikipedia article?

        Edit: Ah, I see - because of a typo I made, corrected.

        ? 1 Reply Last reply
        1
        • marioM mario

          @Hillside502 why are you linking me to a wikipedia article?

          Edit: Ah, I see - because of a typo I made, corrected.

          ? Offline
          ? Offline
          A Former User
          wrote on last edited by
          #6

          @mario
          just to indicate the source of my correction

          marioM 1 Reply Last reply
          2
          • ? A Former User

            @mario
            just to indicate the source of my correction

            marioM Offline
            marioM Offline
            mario
            App Dev
            wrote on last edited by
            #7

            @Hillside502 said in Critical: Cloudron Password Hash Algorithm Must Be Updated Immediately:

            @mario
            just to indicate the source of my correction

            Yup, thanks - a typo 🙂

            1 Reply Last reply
            1
            • marioM Offline
              marioM Offline
              mario
              App Dev
              wrote on last edited by
              #8

              For transparency reasons and so you can understand why there's no real danger here, here's what @mehdi and me wrote:

              me:

              " you are aware that HMAC/SHA1 (used by PBKDF) is just fine for password storage and not really broken as you say?
              even MD5 would be just fine
              afaik
              so the urgency is non-warranted 🙂
              "

              @mehdi explains it in greater detail:

              "
              To be clear, pbkdf2-sha1 is not sha1. Using just sha1 or md5 would be extremely
              bad, using just any hash fonction would be very very bad, as they are litteraly built to be as fast as possible, whereas for storing passwords we deliberatly want it to be slow. PBKDF2 uses a hash function in a much more complicated scheme, to make them suitable for storing passwords and/or creating symetric keys from a password.
              So pbkdf2 is not broken, even if the sha1 it uses is broken
              "

              (I need to look how quoting works with this forum software, so sorry about that)

              1 Reply Last reply
              2
              • mehdiM Offline
                mehdiM Offline
                mehdi
                App Dev
                wrote on last edited by
                #9

                Exactly what Mario just said. Your data is not at risk. This is not a security flaw.

                To explain a bit more, I posted this in the chat:

                To explain a bit more, hash functions should have 2 main caracteristics : non-reversibility (given the output, you cannot know the input), and minimal collisions (2 inputs should not have the same output). For SHA1, the collisions part was completely broken, but for passords we mainly care about the non-reversibility part.

                But PBKDF2 is definitely not state-of-the-art either... I would recommend moving to scrypt (which has my personal preference), or argon2, yeah. There is, however, no urgency whatsoever. And the migration may be a bit tricky.

                1 Reply Last reply
                1
                • girishG Offline
                  girishG Offline
                  girish
                  Staff
                  wrote on last edited by
                  #10

                  As others pointed, Cloudron uses PBKDF2-HMAC-SHA1 with a per-user salt. This is totally different from just using SHA1.

                  As we are not cryptographers ourselves, the best approach is to not try to re-implement crypto ourselves and just follow NIST guidelines - NIST 800-63 Specs.

                  It recommends PBKDF2 and atleast 10k iterations. We also follow most of it's other password guidelines including following including 8 character minimum, support at least 64 characters maximum length, all ASCII characters (including space) should be supported, no password hints/expiry, non-SMS 2FA etc.

                  There is a good article summarizing the NIST guidelines at the Sophos website and also an article how to store passwords safely.

                  ? 1 Reply Last reply
                  8
                  • girishG Offline
                    girishG Offline
                    girish
                    Staff
                    wrote on last edited by
                    #11

                    I changed the title of this post to be less flame-baity

                    1 Reply Last reply
                    8
                    • girishG girish

                      As others pointed, Cloudron uses PBKDF2-HMAC-SHA1 with a per-user salt. This is totally different from just using SHA1.

                      As we are not cryptographers ourselves, the best approach is to not try to re-implement crypto ourselves and just follow NIST guidelines - NIST 800-63 Specs.

                      It recommends PBKDF2 and atleast 10k iterations. We also follow most of it's other password guidelines including following including 8 character minimum, support at least 64 characters maximum length, all ASCII characters (including space) should be supported, no password hints/expiry, non-SMS 2FA etc.

                      There is a good article summarizing the NIST guidelines at the Sophos website and also an article how to store passwords safely.

                      ? Offline
                      ? Offline
                      A Former User
                      wrote on last edited by
                      #12

                      @girish
                      Good to know that max password length is >=64, as at one time Cloudron's was 30

                      girishG 1 Reply Last reply
                      1
                      • ? A Former User

                        @girish
                        Good to know that max password length is >=64, as at one time Cloudron's was 30

                        girishG Offline
                        girishG Offline
                        girish
                        Staff
                        wrote on last edited by
                        #13

                        @Hillside502 yes, that was a ui bug!

                        1 Reply Last reply
                        1
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Don't have an account? Register

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • Bookmarks
                        • Search