• zarathustra0@lemmy.world
    link
    fedilink
    arrow-up
    14
    ·
    8 days ago

    Point is, you can’t guarantee hash length in unaffected by password length.

    You can if the software you use makes use of a sane hashing algorithm.

    A hash function is any function that can be used to map data of arbitrary size to fixed-size values, though there are some hash functions that support variable-length output (https://en.wikipedia.org/wiki/Hash_function)

    • wizardbeard@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      3
      ·
      8 days ago

      But that’s exactly my point. You can’t rely on that.


      The rest of this is a rambling attempt to back up my point.

      We wouldn’t have car accidents if everyone drove and maintained their vehicles properly.

      People, including software devs, make mistakes. They end up with deadlines, ridiculous shit expectations and decrees from management, any of a countless number of reasons why any piece of software might not be designed as it should have been. And something as ridiculously back-end as password hashing functionality isn’t liable to be seen by nearly anyone. Besides the other members of my team I warned about this system, no one else in tge company knew of these flaws and quirks.

      From unfortunate experience, if someone can confidently bullshit to the regulatory auditors, incredibly few of the auditors have the skills to truly verify claims about whether something is actually compliant or not. Actually safe or not. So many cybersecurity “professionals” I’ve encountered in my career are glorified run buttons for premade vuln scanners, unable to even check the mitigating factors in the enterprise systems they are responsible for the security of.

      This wasn’t some in-house hacked together program, it was a piece of software created by a very large company in the financial technologies space, with a double digit number of corporations as customers just for this specific heinously insecure piece of software they sold. For decades.

      I did my part and reported it to their security contact. Nothing happened. Beyond internal discussion with some of my teammates, I’ve not spoken about it until after the software was deprecated not only for my company, but globally.

      I can’t really emphasize how big this system was for having these babby’s first software project level oversights. Financial transactions were initiated by this system.

      Given that, and many of the other just absurdly insane things I’ve seen from professional, million dollar contract type pieces of software, in my decade plus in the industry… There’s how things should work. The theoretical ideal. And then there’s the actually implemented garbage we actually have to deal with.