-
Notifications
You must be signed in to change notification settings - Fork 56
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Argon2 #104
Comments
Huh, I thought we already had an open wishlist item for argon2 but I guess we don't. We would certainly consider a patch or PR to add argon2. The main reasons I haven't done it already are lack of time and the fact that the reference implementation is a fairly bulky library. |
Well, given the circumstance that |
2 cents:
|
NETBSD added Argon2 algo to its crypt(3) btw: https://netbsd.gw.com/cgi-bin/man-cgi?crypt++NetBSD-current |
I'd be fine with libxcrypt growing an optional runtime dependency on libargon2.so, but is there a second independent implementation of Argon2 yet? This is desirable for verifying interoperability. |
The Argon2 draft RFC is in a late stage of the IRTF process and does not appear to have changed very much in some time. In particular the test vectors have not changed since draft-irtf-cfrg-argon2-02 which was published in March 2017. So I think the risk of implementing something incompatible, if we go ahead before the RFC is published, is quite low. |
Cryptsetup uses Argon2, KeePassXC uses Argon2, but shadow stores my root password as SHA512 by default. To get Argon2 support started, I have created a branch with it: #113 Feel free to give me feedback! |
The RFC has been published last month. |
Link to the RFC: https://datatracker.ietf.org/doc/rfc9106/ |
Anything new on this or the PR? Argon2 seems like a natural choice, given that it probably receives most scrutiny now. |
#150 seems to support an alternative implementation, although it looks abandoned. |
If you are referring to the GitHub repos being archived, they have not been abandoned but have been migrated to https://codeberg.org/maandree. |
I have observed that a search for "argon2" didn't come up with anything relevant in the issue tracker (apart from honourable mentions in a yescrypt discussion), which is pretty much a surprise to me.
Is there any plans to have Argon2 supported? It seems to be one of the most recommended pwhash nowadays, obviously heavily influeced by the PHC.
The text was updated successfully, but these errors were encountered: