Is it bad practice to prefix my hash with the algorithm used?
up vote
38
down vote
favorite
Let's say I have a database with a bunch of users in it. This user database would typically have a hashed password per user. Would it be bad practice to prefix this hash with the hashing algorithm used?
For instance, instead of the hash aaf4c61ddcc5e8a2dabede0f3b482cd9aea9434d
, I store sha1_aaf4c61ddcc5e8a2dabede0f3b482cd9aea9434d
, since the method for making the hash is SHA1.
I noticed Argon2 does this, and I actually think it is quite convenient, because it makes it easier to partially migrate to newer hashing algorithms for newer users over time.
passwords hash
New contributor
|
show 6 more comments
up vote
38
down vote
favorite
Let's say I have a database with a bunch of users in it. This user database would typically have a hashed password per user. Would it be bad practice to prefix this hash with the hashing algorithm used?
For instance, instead of the hash aaf4c61ddcc5e8a2dabede0f3b482cd9aea9434d
, I store sha1_aaf4c61ddcc5e8a2dabede0f3b482cd9aea9434d
, since the method for making the hash is SHA1.
I noticed Argon2 does this, and I actually think it is quite convenient, because it makes it easier to partially migrate to newer hashing algorithms for newer users over time.
passwords hash
New contributor
15
From a security point-of-view, it's fine. From a database point-of-view, 1NF recommends that you use two separate fields instead of string concatenation.
– Heinzi
yesterday
29
@Heinzi Whether that's a sensible recommendation or not depends on how the hash is used. For example there are password hashing libraries which use strings with a concatenation of algorithm, salt, hash, and possibly other fields. When using such a library the string should be treated as an opaque value by the application. The application doesn't need to know the structure of the string, the library takes care of that. And the number of fields can depend on the algorithm in use. When using such a library it is good practice to store the concatenated string in the database.
– kasperd
yesterday
3
@Heinzi OTOH, software modularity can argue against storing them as separate fields. You can write a generic "verify password" that extracts the algorithm from the hash if appropriate, without it having to be an explicit parameter.
– Barmar
yesterday
19
@Heinzi - that's not true any more than storing a date as separate columns for day, month and year. What is an atomic attribute is domain specific. And in every domain I've ever seen, hash and the algorithm specification that produced it are useless without each other, and are thus atomic.
– Davor
yesterday
7
My biggest concern here is that you're using SHA. Instead consider Argon2, scrypt, bcrypt, or PBKDF2 (also known as RFC 2898 Derivation).
– Polynomial
yesterday
|
show 6 more comments
up vote
38
down vote
favorite
up vote
38
down vote
favorite
Let's say I have a database with a bunch of users in it. This user database would typically have a hashed password per user. Would it be bad practice to prefix this hash with the hashing algorithm used?
For instance, instead of the hash aaf4c61ddcc5e8a2dabede0f3b482cd9aea9434d
, I store sha1_aaf4c61ddcc5e8a2dabede0f3b482cd9aea9434d
, since the method for making the hash is SHA1.
I noticed Argon2 does this, and I actually think it is quite convenient, because it makes it easier to partially migrate to newer hashing algorithms for newer users over time.
passwords hash
New contributor
Let's say I have a database with a bunch of users in it. This user database would typically have a hashed password per user. Would it be bad practice to prefix this hash with the hashing algorithm used?
For instance, instead of the hash aaf4c61ddcc5e8a2dabede0f3b482cd9aea9434d
, I store sha1_aaf4c61ddcc5e8a2dabede0f3b482cd9aea9434d
, since the method for making the hash is SHA1.
I noticed Argon2 does this, and I actually think it is quite convenient, because it makes it easier to partially migrate to newer hashing algorithms for newer users over time.
passwords hash
passwords hash
New contributor
New contributor
edited yesterday
schroeder♦
68.9k25146184
68.9k25146184
New contributor
asked yesterday
Mathias Lykkegaard Lorenzen
29125
29125
New contributor
New contributor
15
From a security point-of-view, it's fine. From a database point-of-view, 1NF recommends that you use two separate fields instead of string concatenation.
– Heinzi
yesterday
29
@Heinzi Whether that's a sensible recommendation or not depends on how the hash is used. For example there are password hashing libraries which use strings with a concatenation of algorithm, salt, hash, and possibly other fields. When using such a library the string should be treated as an opaque value by the application. The application doesn't need to know the structure of the string, the library takes care of that. And the number of fields can depend on the algorithm in use. When using such a library it is good practice to store the concatenated string in the database.
– kasperd
yesterday
3
@Heinzi OTOH, software modularity can argue against storing them as separate fields. You can write a generic "verify password" that extracts the algorithm from the hash if appropriate, without it having to be an explicit parameter.
– Barmar
yesterday
19
@Heinzi - that's not true any more than storing a date as separate columns for day, month and year. What is an atomic attribute is domain specific. And in every domain I've ever seen, hash and the algorithm specification that produced it are useless without each other, and are thus atomic.
– Davor
yesterday
7
My biggest concern here is that you're using SHA. Instead consider Argon2, scrypt, bcrypt, or PBKDF2 (also known as RFC 2898 Derivation).
– Polynomial
yesterday
|
show 6 more comments
15
From a security point-of-view, it's fine. From a database point-of-view, 1NF recommends that you use two separate fields instead of string concatenation.
– Heinzi
yesterday
29
@Heinzi Whether that's a sensible recommendation or not depends on how the hash is used. For example there are password hashing libraries which use strings with a concatenation of algorithm, salt, hash, and possibly other fields. When using such a library the string should be treated as an opaque value by the application. The application doesn't need to know the structure of the string, the library takes care of that. And the number of fields can depend on the algorithm in use. When using such a library it is good practice to store the concatenated string in the database.
– kasperd
yesterday
3
@Heinzi OTOH, software modularity can argue against storing them as separate fields. You can write a generic "verify password" that extracts the algorithm from the hash if appropriate, without it having to be an explicit parameter.
– Barmar
yesterday
19
@Heinzi - that's not true any more than storing a date as separate columns for day, month and year. What is an atomic attribute is domain specific. And in every domain I've ever seen, hash and the algorithm specification that produced it are useless without each other, and are thus atomic.
– Davor
yesterday
7
My biggest concern here is that you're using SHA. Instead consider Argon2, scrypt, bcrypt, or PBKDF2 (also known as RFC 2898 Derivation).
– Polynomial
yesterday
15
15
From a security point-of-view, it's fine. From a database point-of-view, 1NF recommends that you use two separate fields instead of string concatenation.
– Heinzi
yesterday
From a security point-of-view, it's fine. From a database point-of-view, 1NF recommends that you use two separate fields instead of string concatenation.
– Heinzi
yesterday
29
29
@Heinzi Whether that's a sensible recommendation or not depends on how the hash is used. For example there are password hashing libraries which use strings with a concatenation of algorithm, salt, hash, and possibly other fields. When using such a library the string should be treated as an opaque value by the application. The application doesn't need to know the structure of the string, the library takes care of that. And the number of fields can depend on the algorithm in use. When using such a library it is good practice to store the concatenated string in the database.
– kasperd
yesterday
@Heinzi Whether that's a sensible recommendation or not depends on how the hash is used. For example there are password hashing libraries which use strings with a concatenation of algorithm, salt, hash, and possibly other fields. When using such a library the string should be treated as an opaque value by the application. The application doesn't need to know the structure of the string, the library takes care of that. And the number of fields can depend on the algorithm in use. When using such a library it is good practice to store the concatenated string in the database.
– kasperd
yesterday
3
3
@Heinzi OTOH, software modularity can argue against storing them as separate fields. You can write a generic "verify password" that extracts the algorithm from the hash if appropriate, without it having to be an explicit parameter.
– Barmar
yesterday
@Heinzi OTOH, software modularity can argue against storing them as separate fields. You can write a generic "verify password" that extracts the algorithm from the hash if appropriate, without it having to be an explicit parameter.
– Barmar
yesterday
19
19
@Heinzi - that's not true any more than storing a date as separate columns for day, month and year. What is an atomic attribute is domain specific. And in every domain I've ever seen, hash and the algorithm specification that produced it are useless without each other, and are thus atomic.
– Davor
yesterday
@Heinzi - that's not true any more than storing a date as separate columns for day, month and year. What is an atomic attribute is domain specific. And in every domain I've ever seen, hash and the algorithm specification that produced it are useless without each other, and are thus atomic.
– Davor
yesterday
7
7
My biggest concern here is that you're using SHA. Instead consider Argon2, scrypt, bcrypt, or PBKDF2 (also known as RFC 2898 Derivation).
– Polynomial
yesterday
My biggest concern here is that you're using SHA. Instead consider Argon2, scrypt, bcrypt, or PBKDF2 (also known as RFC 2898 Derivation).
– Polynomial
yesterday
|
show 6 more comments
5 Answers
5
active
oldest
votes
up vote
82
down vote
Many different password hashing systems do this. The type of hashing mechanism used should not be (and should not need to be) a secret. Kerckhoffs's principle says:
A cryptosystem should be secure even if everything about the system,
except the key, is public knowledge.
So, if your system is properly secure, it should not matter if the hash mechanism is exposed.
5
Why “should not be”? Should not need to be secret is Kerckhoffs's principle, but as long as it doesn't cause you to compromise on the key safety it certainly can't cause harm either if the hash algorithm is secret too.
– leftaroundabout
yesterday
6
@leftaroundabout that's about Kerckhoffs's. Operationally and policy-wise, to classify the hashing algorithm as a secret is a problem. It attempts to provide security by obscurity, and it introduces control costs that outweigh the benefits. Not to mention the practical use case provided by Toby Speight. It's not about prepending the alo type, it's about the classification of the data about the algo type.
– schroeder♦
yesterday
2
Classifying it as a secret is not necessary for it being secret. It may be secret incidentally, for performance reasons.
– leftaroundabout
yesterday
15
I was under the impression that adding "security by obscurity" is still a good thing. Systems should be secure, even if you know all of the details of the system, but adding obscurity adds security (to slow down attackers, to hide systems when 0-day bugs get found, etc). It this fair?
– Nathan Merrill
yesterday
8
@NathanMerrill I would say that it should be taken on a case-by-case basis. In this case, I think the benefit of having the algorithm stored with the hash significantly outweighs the very slight security benefit you'd get by obscuring it.
– Jeremy
yesterday
|
show 6 more comments
up vote
28
down vote
I agree with schroeder that this is OK to do. Even without a prefix, an attacker can probably figure out what algorithm you are using. And anyway, it is the strength of the hashing algorithm that protects the passwords, not the secrecy of the algorithm.
Note that many hashing algorithms and libraries already do this for you. They embed all the relevant information - algorithm, cost factors, salt, the actual hash - into one serialized string. See for instance the Modular Crypt Format or the PHP password_hash function. So don't go making up your own scheme. If you are using a descent hashing library you already got one.
Don't use SHA1 to hash passwords, though. That is not OK.
Yeah I used SHA1 because I the hash of "hello" was too long for an example in SHA512.
– Mathias Lykkegaard Lorenzen
yesterday
15
@MathiasLykkegaardLorenzen Don't use SHA512 either, unless it is just a component in a bigger scheme with more iterations. But off course for an example, anything goes! :-)
– Anders
yesterday
3
@MathiasLykkegaardLorenzen And don't just use multiple iterations either! Use a proven construct like PBKDF2, which uses HMAC (not just raw hash iterations).
– forest
yesterday
Is SHA512 considered insecure? I did not know that at this time. Can you reference an article stating why?
– Mathias Lykkegaard Lorenzen
19 hours ago
5
It's not insecure for what it was designed for (i.e. hashing data), but it was designed to be fast. You want your password hash function to be slow to stave off brute force attempts.
– hlt
18 hours ago
|
show 2 more comments
up vote
11
down vote
No, it's not bad practice, and arguably, you should keep this information.
As you observe, this allows you to change algorithm for new passwords whenever you like, without invalidating all users' existing passwords (doing that tends to make you unpopular, for some reason).
There's an argument that this allows an attacker to search out the older, weaker passwords to attack first, but you haven't reduced their security at all (assuming Kerckhoff's Principle, that the algorithm itself mustn't need to be a secret).
1
If one can store a combination of algorithms and salts, there's no need to keep weaker passwords once stronger algorithms are available. If the current entry says that putting the password through weakAlgorithm with salt1 yields X, simply compute Y by putting X through a strongerAlgorithm with salt2 then change the entry to say that putting the password through the weakAlgorithm with salt1, and then putting the result of that through a stronger algorithm with salt2, will yield Y. No need to wait for the user to log in.
– supercat
yesterday
add a comment |
up vote
7
down vote
It's good practice to store the hashing algorithm, but proper password hashing functions such as Argon2 and PBKDF2 already take care of this. It is however bad practice to use SHA1 or SHA256 alone for password hashing because they're a fixed (and relatively small) amount of work to crack using dictionary attacks and brute force. Those passwords should be migrated to a secure hashing function by rehashing the password on their next login. See https://crypto.stackexchange.com/a/45405 for details.
New contributor
add a comment |
up vote
0
down vote
It's not bad practice, it's actually a common thing to do. In fact if you open the /etc/shadow
file on a linux machine you will see your hashed password prefixed with $x$salt$ where x is a number indicating which hashing algorithm was used.
Now a few things you might want to consider:
- do not use SHA1 directly as a hashing algorithm. Use bcrypt or scrypt instead. These do use simple hashing algorithm like SHA1 as a base, but they run that several times over your secret in a way that makes it resistant to attacks and future-proof.
- for practical reasons, since you're using a database and not a file, you might want to store the hashing method and salt in separate rows. However you can also choose to store the string starting with $x$salt$ in your database, and parse the salt and hashing method from that string at the time you check the password. It's probably fast enough that it makes no significant difference. And in both cases the security of your system will be the same.
New contributor
The OP says in comments that SHA-1 was only used as an example and is not used in production
– schroeder♦
7 hours ago
One needs to use more than "run that several times", it needs to have a CPU utilization or ~100ms and a random salt.
– zaph
7 hours ago
add a comment |
5 Answers
5
active
oldest
votes
5 Answers
5
active
oldest
votes
active
oldest
votes
active
oldest
votes
up vote
82
down vote
Many different password hashing systems do this. The type of hashing mechanism used should not be (and should not need to be) a secret. Kerckhoffs's principle says:
A cryptosystem should be secure even if everything about the system,
except the key, is public knowledge.
So, if your system is properly secure, it should not matter if the hash mechanism is exposed.
5
Why “should not be”? Should not need to be secret is Kerckhoffs's principle, but as long as it doesn't cause you to compromise on the key safety it certainly can't cause harm either if the hash algorithm is secret too.
– leftaroundabout
yesterday
6
@leftaroundabout that's about Kerckhoffs's. Operationally and policy-wise, to classify the hashing algorithm as a secret is a problem. It attempts to provide security by obscurity, and it introduces control costs that outweigh the benefits. Not to mention the practical use case provided by Toby Speight. It's not about prepending the alo type, it's about the classification of the data about the algo type.
– schroeder♦
yesterday
2
Classifying it as a secret is not necessary for it being secret. It may be secret incidentally, for performance reasons.
– leftaroundabout
yesterday
15
I was under the impression that adding "security by obscurity" is still a good thing. Systems should be secure, even if you know all of the details of the system, but adding obscurity adds security (to slow down attackers, to hide systems when 0-day bugs get found, etc). It this fair?
– Nathan Merrill
yesterday
8
@NathanMerrill I would say that it should be taken on a case-by-case basis. In this case, I think the benefit of having the algorithm stored with the hash significantly outweighs the very slight security benefit you'd get by obscuring it.
– Jeremy
yesterday
|
show 6 more comments
up vote
82
down vote
Many different password hashing systems do this. The type of hashing mechanism used should not be (and should not need to be) a secret. Kerckhoffs's principle says:
A cryptosystem should be secure even if everything about the system,
except the key, is public knowledge.
So, if your system is properly secure, it should not matter if the hash mechanism is exposed.
5
Why “should not be”? Should not need to be secret is Kerckhoffs's principle, but as long as it doesn't cause you to compromise on the key safety it certainly can't cause harm either if the hash algorithm is secret too.
– leftaroundabout
yesterday
6
@leftaroundabout that's about Kerckhoffs's. Operationally and policy-wise, to classify the hashing algorithm as a secret is a problem. It attempts to provide security by obscurity, and it introduces control costs that outweigh the benefits. Not to mention the practical use case provided by Toby Speight. It's not about prepending the alo type, it's about the classification of the data about the algo type.
– schroeder♦
yesterday
2
Classifying it as a secret is not necessary for it being secret. It may be secret incidentally, for performance reasons.
– leftaroundabout
yesterday
15
I was under the impression that adding "security by obscurity" is still a good thing. Systems should be secure, even if you know all of the details of the system, but adding obscurity adds security (to slow down attackers, to hide systems when 0-day bugs get found, etc). It this fair?
– Nathan Merrill
yesterday
8
@NathanMerrill I would say that it should be taken on a case-by-case basis. In this case, I think the benefit of having the algorithm stored with the hash significantly outweighs the very slight security benefit you'd get by obscuring it.
– Jeremy
yesterday
|
show 6 more comments
up vote
82
down vote
up vote
82
down vote
Many different password hashing systems do this. The type of hashing mechanism used should not be (and should not need to be) a secret. Kerckhoffs's principle says:
A cryptosystem should be secure even if everything about the system,
except the key, is public knowledge.
So, if your system is properly secure, it should not matter if the hash mechanism is exposed.
Many different password hashing systems do this. The type of hashing mechanism used should not be (and should not need to be) a secret. Kerckhoffs's principle says:
A cryptosystem should be secure even if everything about the system,
except the key, is public knowledge.
So, if your system is properly secure, it should not matter if the hash mechanism is exposed.
answered yesterday
schroeder♦
68.9k25146184
68.9k25146184
5
Why “should not be”? Should not need to be secret is Kerckhoffs's principle, but as long as it doesn't cause you to compromise on the key safety it certainly can't cause harm either if the hash algorithm is secret too.
– leftaroundabout
yesterday
6
@leftaroundabout that's about Kerckhoffs's. Operationally and policy-wise, to classify the hashing algorithm as a secret is a problem. It attempts to provide security by obscurity, and it introduces control costs that outweigh the benefits. Not to mention the practical use case provided by Toby Speight. It's not about prepending the alo type, it's about the classification of the data about the algo type.
– schroeder♦
yesterday
2
Classifying it as a secret is not necessary for it being secret. It may be secret incidentally, for performance reasons.
– leftaroundabout
yesterday
15
I was under the impression that adding "security by obscurity" is still a good thing. Systems should be secure, even if you know all of the details of the system, but adding obscurity adds security (to slow down attackers, to hide systems when 0-day bugs get found, etc). It this fair?
– Nathan Merrill
yesterday
8
@NathanMerrill I would say that it should be taken on a case-by-case basis. In this case, I think the benefit of having the algorithm stored with the hash significantly outweighs the very slight security benefit you'd get by obscuring it.
– Jeremy
yesterday
|
show 6 more comments
5
Why “should not be”? Should not need to be secret is Kerckhoffs's principle, but as long as it doesn't cause you to compromise on the key safety it certainly can't cause harm either if the hash algorithm is secret too.
– leftaroundabout
yesterday
6
@leftaroundabout that's about Kerckhoffs's. Operationally and policy-wise, to classify the hashing algorithm as a secret is a problem. It attempts to provide security by obscurity, and it introduces control costs that outweigh the benefits. Not to mention the practical use case provided by Toby Speight. It's not about prepending the alo type, it's about the classification of the data about the algo type.
– schroeder♦
yesterday
2
Classifying it as a secret is not necessary for it being secret. It may be secret incidentally, for performance reasons.
– leftaroundabout
yesterday
15
I was under the impression that adding "security by obscurity" is still a good thing. Systems should be secure, even if you know all of the details of the system, but adding obscurity adds security (to slow down attackers, to hide systems when 0-day bugs get found, etc). It this fair?
– Nathan Merrill
yesterday
8
@NathanMerrill I would say that it should be taken on a case-by-case basis. In this case, I think the benefit of having the algorithm stored with the hash significantly outweighs the very slight security benefit you'd get by obscuring it.
– Jeremy
yesterday
5
5
Why “should not be”? Should not need to be secret is Kerckhoffs's principle, but as long as it doesn't cause you to compromise on the key safety it certainly can't cause harm either if the hash algorithm is secret too.
– leftaroundabout
yesterday
Why “should not be”? Should not need to be secret is Kerckhoffs's principle, but as long as it doesn't cause you to compromise on the key safety it certainly can't cause harm either if the hash algorithm is secret too.
– leftaroundabout
yesterday
6
6
@leftaroundabout that's about Kerckhoffs's. Operationally and policy-wise, to classify the hashing algorithm as a secret is a problem. It attempts to provide security by obscurity, and it introduces control costs that outweigh the benefits. Not to mention the practical use case provided by Toby Speight. It's not about prepending the alo type, it's about the classification of the data about the algo type.
– schroeder♦
yesterday
@leftaroundabout that's about Kerckhoffs's. Operationally and policy-wise, to classify the hashing algorithm as a secret is a problem. It attempts to provide security by obscurity, and it introduces control costs that outweigh the benefits. Not to mention the practical use case provided by Toby Speight. It's not about prepending the alo type, it's about the classification of the data about the algo type.
– schroeder♦
yesterday
2
2
Classifying it as a secret is not necessary for it being secret. It may be secret incidentally, for performance reasons.
– leftaroundabout
yesterday
Classifying it as a secret is not necessary for it being secret. It may be secret incidentally, for performance reasons.
– leftaroundabout
yesterday
15
15
I was under the impression that adding "security by obscurity" is still a good thing. Systems should be secure, even if you know all of the details of the system, but adding obscurity adds security (to slow down attackers, to hide systems when 0-day bugs get found, etc). It this fair?
– Nathan Merrill
yesterday
I was under the impression that adding "security by obscurity" is still a good thing. Systems should be secure, even if you know all of the details of the system, but adding obscurity adds security (to slow down attackers, to hide systems when 0-day bugs get found, etc). It this fair?
– Nathan Merrill
yesterday
8
8
@NathanMerrill I would say that it should be taken on a case-by-case basis. In this case, I think the benefit of having the algorithm stored with the hash significantly outweighs the very slight security benefit you'd get by obscuring it.
– Jeremy
yesterday
@NathanMerrill I would say that it should be taken on a case-by-case basis. In this case, I think the benefit of having the algorithm stored with the hash significantly outweighs the very slight security benefit you'd get by obscuring it.
– Jeremy
yesterday
|
show 6 more comments
up vote
28
down vote
I agree with schroeder that this is OK to do. Even without a prefix, an attacker can probably figure out what algorithm you are using. And anyway, it is the strength of the hashing algorithm that protects the passwords, not the secrecy of the algorithm.
Note that many hashing algorithms and libraries already do this for you. They embed all the relevant information - algorithm, cost factors, salt, the actual hash - into one serialized string. See for instance the Modular Crypt Format or the PHP password_hash function. So don't go making up your own scheme. If you are using a descent hashing library you already got one.
Don't use SHA1 to hash passwords, though. That is not OK.
Yeah I used SHA1 because I the hash of "hello" was too long for an example in SHA512.
– Mathias Lykkegaard Lorenzen
yesterday
15
@MathiasLykkegaardLorenzen Don't use SHA512 either, unless it is just a component in a bigger scheme with more iterations. But off course for an example, anything goes! :-)
– Anders
yesterday
3
@MathiasLykkegaardLorenzen And don't just use multiple iterations either! Use a proven construct like PBKDF2, which uses HMAC (not just raw hash iterations).
– forest
yesterday
Is SHA512 considered insecure? I did not know that at this time. Can you reference an article stating why?
– Mathias Lykkegaard Lorenzen
19 hours ago
5
It's not insecure for what it was designed for (i.e. hashing data), but it was designed to be fast. You want your password hash function to be slow to stave off brute force attempts.
– hlt
18 hours ago
|
show 2 more comments
up vote
28
down vote
I agree with schroeder that this is OK to do. Even without a prefix, an attacker can probably figure out what algorithm you are using. And anyway, it is the strength of the hashing algorithm that protects the passwords, not the secrecy of the algorithm.
Note that many hashing algorithms and libraries already do this for you. They embed all the relevant information - algorithm, cost factors, salt, the actual hash - into one serialized string. See for instance the Modular Crypt Format or the PHP password_hash function. So don't go making up your own scheme. If you are using a descent hashing library you already got one.
Don't use SHA1 to hash passwords, though. That is not OK.
Yeah I used SHA1 because I the hash of "hello" was too long for an example in SHA512.
– Mathias Lykkegaard Lorenzen
yesterday
15
@MathiasLykkegaardLorenzen Don't use SHA512 either, unless it is just a component in a bigger scheme with more iterations. But off course for an example, anything goes! :-)
– Anders
yesterday
3
@MathiasLykkegaardLorenzen And don't just use multiple iterations either! Use a proven construct like PBKDF2, which uses HMAC (not just raw hash iterations).
– forest
yesterday
Is SHA512 considered insecure? I did not know that at this time. Can you reference an article stating why?
– Mathias Lykkegaard Lorenzen
19 hours ago
5
It's not insecure for what it was designed for (i.e. hashing data), but it was designed to be fast. You want your password hash function to be slow to stave off brute force attempts.
– hlt
18 hours ago
|
show 2 more comments
up vote
28
down vote
up vote
28
down vote
I agree with schroeder that this is OK to do. Even without a prefix, an attacker can probably figure out what algorithm you are using. And anyway, it is the strength of the hashing algorithm that protects the passwords, not the secrecy of the algorithm.
Note that many hashing algorithms and libraries already do this for you. They embed all the relevant information - algorithm, cost factors, salt, the actual hash - into one serialized string. See for instance the Modular Crypt Format or the PHP password_hash function. So don't go making up your own scheme. If you are using a descent hashing library you already got one.
Don't use SHA1 to hash passwords, though. That is not OK.
I agree with schroeder that this is OK to do. Even without a prefix, an attacker can probably figure out what algorithm you are using. And anyway, it is the strength of the hashing algorithm that protects the passwords, not the secrecy of the algorithm.
Note that many hashing algorithms and libraries already do this for you. They embed all the relevant information - algorithm, cost factors, salt, the actual hash - into one serialized string. See for instance the Modular Crypt Format or the PHP password_hash function. So don't go making up your own scheme. If you are using a descent hashing library you already got one.
Don't use SHA1 to hash passwords, though. That is not OK.
answered yesterday
Anders
46.9k21132155
46.9k21132155
Yeah I used SHA1 because I the hash of "hello" was too long for an example in SHA512.
– Mathias Lykkegaard Lorenzen
yesterday
15
@MathiasLykkegaardLorenzen Don't use SHA512 either, unless it is just a component in a bigger scheme with more iterations. But off course for an example, anything goes! :-)
– Anders
yesterday
3
@MathiasLykkegaardLorenzen And don't just use multiple iterations either! Use a proven construct like PBKDF2, which uses HMAC (not just raw hash iterations).
– forest
yesterday
Is SHA512 considered insecure? I did not know that at this time. Can you reference an article stating why?
– Mathias Lykkegaard Lorenzen
19 hours ago
5
It's not insecure for what it was designed for (i.e. hashing data), but it was designed to be fast. You want your password hash function to be slow to stave off brute force attempts.
– hlt
18 hours ago
|
show 2 more comments
Yeah I used SHA1 because I the hash of "hello" was too long for an example in SHA512.
– Mathias Lykkegaard Lorenzen
yesterday
15
@MathiasLykkegaardLorenzen Don't use SHA512 either, unless it is just a component in a bigger scheme with more iterations. But off course for an example, anything goes! :-)
– Anders
yesterday
3
@MathiasLykkegaardLorenzen And don't just use multiple iterations either! Use a proven construct like PBKDF2, which uses HMAC (not just raw hash iterations).
– forest
yesterday
Is SHA512 considered insecure? I did not know that at this time. Can you reference an article stating why?
– Mathias Lykkegaard Lorenzen
19 hours ago
5
It's not insecure for what it was designed for (i.e. hashing data), but it was designed to be fast. You want your password hash function to be slow to stave off brute force attempts.
– hlt
18 hours ago
Yeah I used SHA1 because I the hash of "hello" was too long for an example in SHA512.
– Mathias Lykkegaard Lorenzen
yesterday
Yeah I used SHA1 because I the hash of "hello" was too long for an example in SHA512.
– Mathias Lykkegaard Lorenzen
yesterday
15
15
@MathiasLykkegaardLorenzen Don't use SHA512 either, unless it is just a component in a bigger scheme with more iterations. But off course for an example, anything goes! :-)
– Anders
yesterday
@MathiasLykkegaardLorenzen Don't use SHA512 either, unless it is just a component in a bigger scheme with more iterations. But off course for an example, anything goes! :-)
– Anders
yesterday
3
3
@MathiasLykkegaardLorenzen And don't just use multiple iterations either! Use a proven construct like PBKDF2, which uses HMAC (not just raw hash iterations).
– forest
yesterday
@MathiasLykkegaardLorenzen And don't just use multiple iterations either! Use a proven construct like PBKDF2, which uses HMAC (not just raw hash iterations).
– forest
yesterday
Is SHA512 considered insecure? I did not know that at this time. Can you reference an article stating why?
– Mathias Lykkegaard Lorenzen
19 hours ago
Is SHA512 considered insecure? I did not know that at this time. Can you reference an article stating why?
– Mathias Lykkegaard Lorenzen
19 hours ago
5
5
It's not insecure for what it was designed for (i.e. hashing data), but it was designed to be fast. You want your password hash function to be slow to stave off brute force attempts.
– hlt
18 hours ago
It's not insecure for what it was designed for (i.e. hashing data), but it was designed to be fast. You want your password hash function to be slow to stave off brute force attempts.
– hlt
18 hours ago
|
show 2 more comments
up vote
11
down vote
No, it's not bad practice, and arguably, you should keep this information.
As you observe, this allows you to change algorithm for new passwords whenever you like, without invalidating all users' existing passwords (doing that tends to make you unpopular, for some reason).
There's an argument that this allows an attacker to search out the older, weaker passwords to attack first, but you haven't reduced their security at all (assuming Kerckhoff's Principle, that the algorithm itself mustn't need to be a secret).
1
If one can store a combination of algorithms and salts, there's no need to keep weaker passwords once stronger algorithms are available. If the current entry says that putting the password through weakAlgorithm with salt1 yields X, simply compute Y by putting X through a strongerAlgorithm with salt2 then change the entry to say that putting the password through the weakAlgorithm with salt1, and then putting the result of that through a stronger algorithm with salt2, will yield Y. No need to wait for the user to log in.
– supercat
yesterday
add a comment |
up vote
11
down vote
No, it's not bad practice, and arguably, you should keep this information.
As you observe, this allows you to change algorithm for new passwords whenever you like, without invalidating all users' existing passwords (doing that tends to make you unpopular, for some reason).
There's an argument that this allows an attacker to search out the older, weaker passwords to attack first, but you haven't reduced their security at all (assuming Kerckhoff's Principle, that the algorithm itself mustn't need to be a secret).
1
If one can store a combination of algorithms and salts, there's no need to keep weaker passwords once stronger algorithms are available. If the current entry says that putting the password through weakAlgorithm with salt1 yields X, simply compute Y by putting X through a strongerAlgorithm with salt2 then change the entry to say that putting the password through the weakAlgorithm with salt1, and then putting the result of that through a stronger algorithm with salt2, will yield Y. No need to wait for the user to log in.
– supercat
yesterday
add a comment |
up vote
11
down vote
up vote
11
down vote
No, it's not bad practice, and arguably, you should keep this information.
As you observe, this allows you to change algorithm for new passwords whenever you like, without invalidating all users' existing passwords (doing that tends to make you unpopular, for some reason).
There's an argument that this allows an attacker to search out the older, weaker passwords to attack first, but you haven't reduced their security at all (assuming Kerckhoff's Principle, that the algorithm itself mustn't need to be a secret).
No, it's not bad practice, and arguably, you should keep this information.
As you observe, this allows you to change algorithm for new passwords whenever you like, without invalidating all users' existing passwords (doing that tends to make you unpopular, for some reason).
There's an argument that this allows an attacker to search out the older, weaker passwords to attack first, but you haven't reduced their security at all (assuming Kerckhoff's Principle, that the algorithm itself mustn't need to be a secret).
answered yesterday
Toby Speight
1,044415
1,044415
1
If one can store a combination of algorithms and salts, there's no need to keep weaker passwords once stronger algorithms are available. If the current entry says that putting the password through weakAlgorithm with salt1 yields X, simply compute Y by putting X through a strongerAlgorithm with salt2 then change the entry to say that putting the password through the weakAlgorithm with salt1, and then putting the result of that through a stronger algorithm with salt2, will yield Y. No need to wait for the user to log in.
– supercat
yesterday
add a comment |
1
If one can store a combination of algorithms and salts, there's no need to keep weaker passwords once stronger algorithms are available. If the current entry says that putting the password through weakAlgorithm with salt1 yields X, simply compute Y by putting X through a strongerAlgorithm with salt2 then change the entry to say that putting the password through the weakAlgorithm with salt1, and then putting the result of that through a stronger algorithm with salt2, will yield Y. No need to wait for the user to log in.
– supercat
yesterday
1
1
If one can store a combination of algorithms and salts, there's no need to keep weaker passwords once stronger algorithms are available. If the current entry says that putting the password through weakAlgorithm with salt1 yields X, simply compute Y by putting X through a strongerAlgorithm with salt2 then change the entry to say that putting the password through the weakAlgorithm with salt1, and then putting the result of that through a stronger algorithm with salt2, will yield Y. No need to wait for the user to log in.
– supercat
yesterday
If one can store a combination of algorithms and salts, there's no need to keep weaker passwords once stronger algorithms are available. If the current entry says that putting the password through weakAlgorithm with salt1 yields X, simply compute Y by putting X through a strongerAlgorithm with salt2 then change the entry to say that putting the password through the weakAlgorithm with salt1, and then putting the result of that through a stronger algorithm with salt2, will yield Y. No need to wait for the user to log in.
– supercat
yesterday
add a comment |
up vote
7
down vote
It's good practice to store the hashing algorithm, but proper password hashing functions such as Argon2 and PBKDF2 already take care of this. It is however bad practice to use SHA1 or SHA256 alone for password hashing because they're a fixed (and relatively small) amount of work to crack using dictionary attacks and brute force. Those passwords should be migrated to a secure hashing function by rehashing the password on their next login. See https://crypto.stackexchange.com/a/45405 for details.
New contributor
add a comment |
up vote
7
down vote
It's good practice to store the hashing algorithm, but proper password hashing functions such as Argon2 and PBKDF2 already take care of this. It is however bad practice to use SHA1 or SHA256 alone for password hashing because they're a fixed (and relatively small) amount of work to crack using dictionary attacks and brute force. Those passwords should be migrated to a secure hashing function by rehashing the password on their next login. See https://crypto.stackexchange.com/a/45405 for details.
New contributor
add a comment |
up vote
7
down vote
up vote
7
down vote
It's good practice to store the hashing algorithm, but proper password hashing functions such as Argon2 and PBKDF2 already take care of this. It is however bad practice to use SHA1 or SHA256 alone for password hashing because they're a fixed (and relatively small) amount of work to crack using dictionary attacks and brute force. Those passwords should be migrated to a secure hashing function by rehashing the password on their next login. See https://crypto.stackexchange.com/a/45405 for details.
New contributor
It's good practice to store the hashing algorithm, but proper password hashing functions such as Argon2 and PBKDF2 already take care of this. It is however bad practice to use SHA1 or SHA256 alone for password hashing because they're a fixed (and relatively small) amount of work to crack using dictionary attacks and brute force. Those passwords should be migrated to a secure hashing function by rehashing the password on their next login. See https://crypto.stackexchange.com/a/45405 for details.
New contributor
New contributor
answered yesterday
leo v
711
711
New contributor
New contributor
add a comment |
add a comment |
up vote
0
down vote
It's not bad practice, it's actually a common thing to do. In fact if you open the /etc/shadow
file on a linux machine you will see your hashed password prefixed with $x$salt$ where x is a number indicating which hashing algorithm was used.
Now a few things you might want to consider:
- do not use SHA1 directly as a hashing algorithm. Use bcrypt or scrypt instead. These do use simple hashing algorithm like SHA1 as a base, but they run that several times over your secret in a way that makes it resistant to attacks and future-proof.
- for practical reasons, since you're using a database and not a file, you might want to store the hashing method and salt in separate rows. However you can also choose to store the string starting with $x$salt$ in your database, and parse the salt and hashing method from that string at the time you check the password. It's probably fast enough that it makes no significant difference. And in both cases the security of your system will be the same.
New contributor
The OP says in comments that SHA-1 was only used as an example and is not used in production
– schroeder♦
7 hours ago
One needs to use more than "run that several times", it needs to have a CPU utilization or ~100ms and a random salt.
– zaph
7 hours ago
add a comment |
up vote
0
down vote
It's not bad practice, it's actually a common thing to do. In fact if you open the /etc/shadow
file on a linux machine you will see your hashed password prefixed with $x$salt$ where x is a number indicating which hashing algorithm was used.
Now a few things you might want to consider:
- do not use SHA1 directly as a hashing algorithm. Use bcrypt or scrypt instead. These do use simple hashing algorithm like SHA1 as a base, but they run that several times over your secret in a way that makes it resistant to attacks and future-proof.
- for practical reasons, since you're using a database and not a file, you might want to store the hashing method and salt in separate rows. However you can also choose to store the string starting with $x$salt$ in your database, and parse the salt and hashing method from that string at the time you check the password. It's probably fast enough that it makes no significant difference. And in both cases the security of your system will be the same.
New contributor
The OP says in comments that SHA-1 was only used as an example and is not used in production
– schroeder♦
7 hours ago
One needs to use more than "run that several times", it needs to have a CPU utilization or ~100ms and a random salt.
– zaph
7 hours ago
add a comment |
up vote
0
down vote
up vote
0
down vote
It's not bad practice, it's actually a common thing to do. In fact if you open the /etc/shadow
file on a linux machine you will see your hashed password prefixed with $x$salt$ where x is a number indicating which hashing algorithm was used.
Now a few things you might want to consider:
- do not use SHA1 directly as a hashing algorithm. Use bcrypt or scrypt instead. These do use simple hashing algorithm like SHA1 as a base, but they run that several times over your secret in a way that makes it resistant to attacks and future-proof.
- for practical reasons, since you're using a database and not a file, you might want to store the hashing method and salt in separate rows. However you can also choose to store the string starting with $x$salt$ in your database, and parse the salt and hashing method from that string at the time you check the password. It's probably fast enough that it makes no significant difference. And in both cases the security of your system will be the same.
New contributor
It's not bad practice, it's actually a common thing to do. In fact if you open the /etc/shadow
file on a linux machine you will see your hashed password prefixed with $x$salt$ where x is a number indicating which hashing algorithm was used.
Now a few things you might want to consider:
- do not use SHA1 directly as a hashing algorithm. Use bcrypt or scrypt instead. These do use simple hashing algorithm like SHA1 as a base, but they run that several times over your secret in a way that makes it resistant to attacks and future-proof.
- for practical reasons, since you're using a database and not a file, you might want to store the hashing method and salt in separate rows. However you can also choose to store the string starting with $x$salt$ in your database, and parse the salt and hashing method from that string at the time you check the password. It's probably fast enough that it makes no significant difference. And in both cases the security of your system will be the same.
New contributor
New contributor
answered 9 hours ago
Nicolas Marshall
1012
1012
New contributor
New contributor
The OP says in comments that SHA-1 was only used as an example and is not used in production
– schroeder♦
7 hours ago
One needs to use more than "run that several times", it needs to have a CPU utilization or ~100ms and a random salt.
– zaph
7 hours ago
add a comment |
The OP says in comments that SHA-1 was only used as an example and is not used in production
– schroeder♦
7 hours ago
One needs to use more than "run that several times", it needs to have a CPU utilization or ~100ms and a random salt.
– zaph
7 hours ago
The OP says in comments that SHA-1 was only used as an example and is not used in production
– schroeder♦
7 hours ago
The OP says in comments that SHA-1 was only used as an example and is not used in production
– schroeder♦
7 hours ago
One needs to use more than "run that several times", it needs to have a CPU utilization or ~100ms and a random salt.
– zaph
7 hours ago
One needs to use more than "run that several times", it needs to have a CPU utilization or ~100ms and a random salt.
– zaph
7 hours ago
add a comment |
Mathias Lykkegaard Lorenzen is a new contributor. Be nice, and check out our Code of Conduct.
Mathias Lykkegaard Lorenzen is a new contributor. Be nice, and check out our Code of Conduct.
Mathias Lykkegaard Lorenzen is a new contributor. Be nice, and check out our Code of Conduct.
Mathias Lykkegaard Lorenzen is a new contributor. Be nice, and check out our Code of Conduct.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f197236%2fis-it-bad-practice-to-prefix-my-hash-with-the-algorithm-used%23new-answer', 'question_page');
);
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
15
From a security point-of-view, it's fine. From a database point-of-view, 1NF recommends that you use two separate fields instead of string concatenation.
– Heinzi
yesterday
29
@Heinzi Whether that's a sensible recommendation or not depends on how the hash is used. For example there are password hashing libraries which use strings with a concatenation of algorithm, salt, hash, and possibly other fields. When using such a library the string should be treated as an opaque value by the application. The application doesn't need to know the structure of the string, the library takes care of that. And the number of fields can depend on the algorithm in use. When using such a library it is good practice to store the concatenated string in the database.
– kasperd
yesterday
3
@Heinzi OTOH, software modularity can argue against storing them as separate fields. You can write a generic "verify password" that extracts the algorithm from the hash if appropriate, without it having to be an explicit parameter.
– Barmar
yesterday
19
@Heinzi - that's not true any more than storing a date as separate columns for day, month and year. What is an atomic attribute is domain specific. And in every domain I've ever seen, hash and the algorithm specification that produced it are useless without each other, and are thus atomic.
– Davor
yesterday
7
My biggest concern here is that you're using SHA. Instead consider Argon2, scrypt, bcrypt, or PBKDF2 (also known as RFC 2898 Derivation).
– Polynomial
yesterday