When discussing hash security and brute force, shouldn't we take a little more?
First of all, md5 obfuscates data stored in a trusted zone or not. In other words, can we trust our db administrator to not try to read user passwords from the database, and brute force cancels them. This can be trusted or technically provided using some security procedures (the db administrator may not have access to the table in which the password hashes are stored, this may be available only to the security officer).
Another possibility is to intercept the password hash of login + password from a client or client-server transaction. If the client does not have a Trojan horse, and the connection between the client and the server is TLS-protected, the pair should be protected from man-in-the-middle attacks.
What remains for the attacker (except social engineering, xss security hacking and hosting) to subsequently send the number of generated requests to the login server and see if it succeeds. This can also be controlled:
- after a successful and unsuccessful login, there may be a random delay time before the service responds to a slowdown in brute force.
- the login process can suspend parallel login requests from the same IP address and parallel logins with the same login name (to enforce the above rule).
- the limit for unsuccessful logins can be set, after it is exceeded, the account is locked and a security warning is triggered.
I believe that when the above rules are implemented, the md5 hash is quite safe. In fact, it is equally safe as a simple password :) To summarize, if we are sure that our md5 hash is safe, we can simply leave the passwords open. Currently, twist is not used by md5 at all (due to password confusion). What needs to be done is to leave it in a repository in a trusted zone or use a stronger tool (for example, SHA) if the trusted zone is not managed. And, in my opinion, the trusted zone is still at risk of server security (hosting services), so regardless of whether passwords are simply confused with SHA (or better) :) This should not be costly to simplify password hashing and it brings some benefits (reduces risks), so my advice will never again repeat this discussion.
However, even when using SHA hashing, all voice security rules must be implemented. Especially TLS, which prevents the compromise of login passwords and password (regardless of whether the password is sent in normal mode or hashed using md5 or sha, it can activate a successful login). It is also necessary to monitor login attempts. Even if we think our site is rude evidence, itβs good to know that someone is trying to compromise security.