Request for feedback: how slow is your slowest MAAS cloud?
Ante Karamatić
ante.karamatic at canonical.com
Fri Jun 2 07:54:16 UTC 2017
Derivation time: 0.8s
Architecture: x86_64
Model name: QEMU Virtual CPU version 0.12
Derivation time: 0.9s
Architecture: x86_64
Model name: Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
Derivation time: 1,3-1,6s
Architecture: x86_64
Model name: Intel(R) Core(TM) i5-4200U CPU @ 1.60GHz
All used as both region and rack controllers.
On Fri, Jun 2, 2017 at 5:00 AM Seth Arnold <seth.arnold at canonical.com>
wrote:
> On Thu, Jun 01, 2017 at 05:46:52PM -0700, Mike Pontillo wrote:
> > In doing so, I'm looking at deriving an shared key that can be used to
> > encrypt network traffic between peer rack and region controllers, and
> > eventually commissioned machines. The industry standard for key
> derivation
> > is the PBKDF2 algorithm, which makes brute force attacks to derive the
> > password from the key harder (by repeatedly running a hash function).
>
> PBKDF2 is also fairly old; I believe most cryptographers would prefer
> argon2, scrypt, or bcrypt to PBKDF2, with a grudging acceptance that if
> you have to sell into the FIPS marketplace you may not have a choice.
> Do we have a choice?
>
> We should also worry about the asymmetry of attackers vs defenders.
> Hashcat on gtx1080 GPUs can crack roughly a thousand of these
> million-iteration PBKDF2 per second.
>
> (I'm extrapolating a bit from the data easily available. This forum post
> says the benchmark uses 1000 iterations:
> https://hashcat.net/forum/thread-5799.html
> And these results say that it can run over a million per second:
> https://gist.github.com/epixoip/6ee29d5d626bd8dfe671a2d8f188b77b
> https://gist.github.com/epixoip/a83d38f412b4737e99bbef804a270c40
> So my assumption is one thousand times the work means a one thousand time
> slowdown. I haven't tested these speeds myself.)
>
> This points out that no matter how expensive the KDF being used,
> passwords such as '123456' 'monkey' etc are always terrible. It might
> take the controllers one second or so to generate the key, but given a
> password in the usual top-1000 list of passwords, hashcat can break it
> in about the same time it took to generate it.
>
> Thanks
> --
> Maas-devel mailing list
> Maas-devel at lists.ubuntu.com
> Modify settings or unsubscribe at:
> https://lists.ubuntu.com/mailman/listinfo/maas-devel
>
--
Ante Karamatić
ante.karamatic at canonical.com
Canonical
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/maas-devel/attachments/20170602/6bf44bce/attachment-0001.html>
More information about the Maas-devel
mailing list