Most active commenters
  • rubendev(7)
  • tptacek(5)
  • akerl_(3)

←back to thread

32 points pregnenolone | 16 comments | | HN request time: 0s | source | bottom
Show context
palantird ◴[] No.45667846[source]
> ... developer education remain essential for realizing Argon2's theoretical advantages.

> 46.6% of deployments use weaker-than-OWASP parameters.

Sounds like a job for better default parameter values. I'm willing to bet most startups just install the default argon2 (or password hashing) library in their language of choice and don't jump head-first into the rabbithole of fine-tuning argon2 parameters unless a contract or certification depend on it.

replies(1): >>45668312 #
swiftcoder ◴[] No.45668312[source]
The documentation on this is... uh... intimidating? I come away from this with the sense that I need to learn a whole lot about cryptography to make a good decision here:

https://argon2-cffi.readthedocs.io/en/stable/parameters.html

replies(1): >>45668409 #
luizfelberti ◴[] No.45668409[source]
Do not reference these kinds of docs whenever you need practical, actionable advice. They serve their purpose, but are for a completely different kind of audience.

For anyone perusing this thread, your first resource for this kind of security advice should probably be the OWASP cheatsheets which is a living set of documents that packages current practice into direct recommendations for implementers.

Here's what it says about tuning Argon2:

https://cheatsheetseries.owasp.org/cheatsheets/Password_Stor...

replies(1): >>45668582 #
1. tptacek ◴[] No.45668582[source]
It's been a couple years since I've looked but the track record of OWASP for cryptography advice has been pretty dismal.
replies(1): >>45669052 #
2. linsomniac ◴[] No.45669052[source]
Do you have a better recommendation?

I feel bad for OWASP. They're doing the lords work, but seem to have a shoestring budget.

replies(1): >>45671551 #
3. rubendev ◴[] No.45671551[source]
The OWASP ASVS appendix on Cryptography is one of the best and concise resources I know for this kind of thing: https://github.com/OWASP/ASVS/blob/master/5.0/en/0x92-Append...
replies(2): >>45671617 #>>45671781 #
4. akerl_ ◴[] No.45671617{3}[source]
I’d wager that something like 90% of developers who look at that page should close the tab instead of reading any of it.

If you’re building a system and need crypto… pick the canonical library for the ecosystem or language you’re working in. Don’t try to build your own collection of primitives.

replies(2): >>45671740 #>>45674244 #
5. rubendev ◴[] No.45671740{4}[source]
Yes I fully agree. I’m a big fan of libraries like Google Tink that make you pick a use case and use the best implementation for that use case with built in crypto agility.

Most crypto libraries are not built like that however. They just give you a big pile of primitives/algorithms to choose from. Then frameworks get built on top of that, not always taking into account best practices, and leave people that are serious about security the job of making sure the implementation is secure. This is the point where you need something like ASVS.

replies(1): >>45671828 #
6. tptacek ◴[] No.45671781{3}[source]
This is just a random list of links to standards and summary tables, some of which are wrong (urandom vs. random, for instance). The "A/L/D" scoring makes very little sense. CBC is legacy-allowable and CTR is disallowed; "verification of padding must be performed in constant time". For reasons passing understanding, "MAC-then-encrypt" is legacy-allowable. They've deprecated the internally truncated SHA2's and kept the full-width ones (the internally truncated ones are more, not less secure). They've taken the time to formally disallow "MD5 and SHA1 based KDF functions". There's a long list of allowed FFDH groups. AES-CMAC is a recommended general-purpose message authenticator.

This is a mess, and I would actively steer people away from it.

replies(1): >>45672111 #
7. akerl_ ◴[] No.45671828{5}[source]
What language today still doesn't have a de facto simplified toolbox for wrapping crypto operations?

If you're a developer, and you start trying to perform crypto operations for your service and the library you chose is making you question which cipher, what KDF parameters, or what DH group you want, that is 100% a red flag and you should promptly stop using that crypto library.

replies(1): >>45672025 #
8. rubendev ◴[] No.45672025{6}[source]
Can you give some examples of such commonly used libraries for languages like Java / C# / C++?

In my experience there are not many libraries like Google Tink around, and they are not in widespread use at all. Most applications doing encryption manually for specific purposes still have the words AES, CBC, GCM, IV etc hardcoded in their source code.

If you review such code, it’s still useful to have resources that show industry best practices, but I agree that the gold standard is to not have these details in your own code at all.

replies(1): >>45672237 #
9. rubendev ◴[] No.45672111{4}[source]
Yes it’s an audit checklist for when you need to know specifically what to use and with which parameters.

It’s unfortunate if there are mistakes in there. The people at OWASP would be very happy to receive feedback on their GitHub I’m sure.

replies(1): >>45672327 #
10. akerl_ ◴[] No.45672237{7}[source]
I'd probably look at https://libsodium.gitbook.io/doc/bindings_for_other_language... or https://nacl.cr.yp.to/box.html
11. tptacek ◴[] No.45672327{5}[source]
It's a bad audit checklist! If OWASP volunteers can't do a good one, they should just not do one at all. It's fine for them not to cover things that are outside their expertise.
replies(1): >>45672516 #
12. rubendev ◴[] No.45672516{6}[source]
Which one would you recommend instead? Referring dev teams to NIST standards or the like doesn’t work well in my experience.
replies(1): >>45672552 #
13. tptacek ◴[] No.45672552{7}[source]
There doesn't always have to be a resource. Sometimes no resource is better than a faulty one. Cryptography is one of those cases.
14. rubendev ◴[] No.45674244{4}[source]
Also, I gave the link to the appendix because there was a specific question about Argon2 parameters. For general developer audiences, they need to look at the standard itself which is a lot more high level about how to properly implement cryptography in software: https://github.com/OWASP/ASVS/blob/master/5.0/en/0x20-V11-Cr...

For the most common use-cases of cryptography like authentication and secure communication there is more specific, but still high level guidance that is useful for developers as well:

- https://github.com/OWASP/ASVS/blob/master/5.0/en/0x21-V12-Se...

- https://github.com/OWASP/ASVS/blob/master/5.0/en/0x18-V9-Sel...

- https://github.com/OWASP/ASVS/blob/master/5.0/en/0x15-V6-Aut...

replies(1): >>45686404 #
15. tptacek ◴[] No.45686404{5}[source]
This standard is bad. People should avoid it. For example: 11.2.2 (cryptographic agility) is an anti-pattern in modern cryptographic engineering.
replies(1): >>45697042 #
16. rubendev ◴[] No.45697042{6}[source]
Please elaborate why you believe that? The ability to easily rotate encryption keys is considered an anti pattern?