@Voxpire @argalep @everyone
https://github.com/ServUO/ServUO/pull/2828
Xeroxxx submitted this pull request about a month ago. Although Dexter tagged others for review it might not be very well known.
Does anyone have any thoughts on why this would be a bad idea? Should it get implemented to offer the best possible protection? Is everything fine the way it is?
His original message from the pull request:
"SHA512 support
Password-System requires complete rework (I will do this) for proper salting (generating 'random' salt on first run) and better readability. Passwords are automatically converted from SHA1 to SHA512 after logon and next save.
NOTICE: SHA512 is the new default if you replace Config/Accounts.cfg. Change it back to NewCrypt (SHA1) in Accounts.cfg if you're in need of SHA1.
However keep in mind Server <-> Client communication stays unencrypted and is absolutely vulnerable to man in the middle attacks as client encryption is removed. It only protects if data gets stolen.
MD5 is no go and SHA1 is known to be vulnerable to collisions.
Cheers"
https://github.com/ServUO/ServUO/pull/2828
Xeroxxx submitted this pull request about a month ago. Although Dexter tagged others for review it might not be very well known.
Does anyone have any thoughts on why this would be a bad idea? Should it get implemented to offer the best possible protection? Is everything fine the way it is?
His original message from the pull request:
"SHA512 support
Password-System requires complete rework (I will do this) for proper salting (generating 'random' salt on first run) and better readability. Passwords are automatically converted from SHA1 to SHA512 after logon and next save.
NOTICE: SHA512 is the new default if you replace Config/Accounts.cfg. Change it back to NewCrypt (SHA1) in Accounts.cfg if you're in need of SHA1.
However keep in mind Server <-> Client communication stays unencrypted and is absolutely vulnerable to man in the middle attacks as client encryption is removed. It only protects if data gets stolen.
MD5 is no go and SHA1 is known to be vulnerable to collisions.
Cheers"