Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Preventing password bruteforcing #6

Open
mbevand opened this issue Jul 24, 2017 · 2 comments
Open

Preventing password bruteforcing #6

mbevand opened this issue Jul 24, 2017 · 2 comments

Comments

@mbevand
Copy link

mbevand commented Jul 24, 2017

State-of-the-art password authentication uses PAKE, which completely prevents bruteforcing passwords: https://en.wikipedia.org/wiki/Password-authenticated_key_agreement See also https://news.ycombinator.com/item?id=14842145

The suggestions to use scrypt or PBKDF2 (under The password can be cracked offline) are obsoleted by PAKE.

@bayotop
Copy link

bayotop commented Oct 16, 2017

Also WPA2 is already using PBKDF2 with 4096 iterations. As a minimum that sentence should be better worded.

@mbevand
Copy link
Author

mbevand commented Jan 10, 2018

It seems a PAKE protocol is finally going to be adopted by WPA3!

Previously [in WPA2], before a handshake could happen on a network, an attacker could do their guessing offline

Source: https://www.darkreading.com/endpoint/wi-fi-alliance-launches-wpa2-enhancements-and-debuts-wpa3/d/d-id/1330762

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants