✏️ Mark your calendars! In just two weeks, I’ll be offering a free Krita workshop (in French) at Capitole du Libre 2024. This session will be a perfect blend of exploring Krita’s features and sharing valuable drawing tips. I can’t wait to see you there and create together! 🎨
More info: https://cfp.capitoledulibre.org/cdl-2024/talk/KLHKLR/
password hashing advice, re: okta vulnerability, grumbling about security
@AFriendlyBeagle Sort of. In and of itself, bcrypt is fine, in that it does what it says on the tin - but it has an input limit (72 bytes if memory serves) that is not widely known, and easily missed. Usually that's only a problem if you have a very long password (since it's essentially quietly truncated to 72 bytes), but if you're using it for a cache key like Okta was... 😐
My go-to recommendation for new systems nowadays is either argon2id, argon2i, or scrypt (in order of preference, depending on what your environment supports). They're more resistant to GPU cracking than bcrypt is. But as long as you aren't prone to the truncation issue (ie. you either restrict the input length or you just don't have such long inputs) there's no need to change what's already using bcrypt, the crypto itself is still considered sound.
Really the only things that warrant immediate change are anything using MD5, SHA1, and (due to the risk of incorrect implementation) anything homegrown using SHA256/SHA512. Third-party implementations of eg. PKBDF based on SHA256/SHA512 should be treated with scrutiny.
CW-boost: election manipulation
okta vulnerability, grumbling about security (2)
I will give Okta a tiny bit of credit for having used a cryptographic hash for their cache, which is something that many people get wrong. But that doesn't really help you if you then use the *wrong* cryptographic hash...
re: okta vulnerability, grumbling about security
@riley I mean, this is true for basically every auth company I've seen, they're all snake oil, just some hide it better than others. But that hasn't stopped them from building an 'experts' reputation in the tech world.
re: okta vulnerability, grumbling about security
@Scmbradley Probably nothing illustrates this better than Stormpath, a now-acquired "security and authentication company" that published an article about JWTs, half of which was outright factually incorrect and would never pass even cursory review by a security expert.
re: okta vulnerability, grumbling about security
@Scmbradley Oh, certainly, and this holds true in that case. But in the past few years it's become a bit of a Thing for people in tech circles to say "authentication is too hard to get right, you should outsource it", which ignores that a) this is outsourcing to a company, not a library, which has wildly different consequences, b) none of these companies are actually competent or trustworthy, and c) you're more likely to fuck up the integration with their (usually overly complex) system than you are to fuck up a simple "hash the password" implementation.
okta vulnerability, grumbling about security
Another year, another critical vulnerability in Okta's infrastructure - an authentication bypass for users with long usernames, this time.
They ran up against bcrypt's input limit. You know, exactly the kind of footgun that causes people to recommend "don't try to roll your own authentication, outsource it to experts". Like... Okta. Who used bcrypt. And did it wrong.
I would really like for people to stop recommending external authentication providers. It's not actually *that* hard to implement authentication correctly for the vast majority of cases, if you take some time to read up on how to do it. Outsourcing isn't the answer here.
I find myself wishing on a daily basis that I had built @bitfolk database as postgres from the start instead of MySQL (now MariaDB).
Don't be like me. If your new thing needs a relational DB, Just Use Postgres.
Just after posting this I lost 3 hours of my life to MariaDB's unhinged and cursed "utf8 charset/collation isn't really utf8" nonsense.
@brucelawson And not the first time I've seen a stalebot close an accessibility issue because nobody in a dev team assigned it to themselves, either...
It's 1214 days since I filed a React Native bug because an external keyboard user on Android cannot get focus into a text input field so can't fill in forms. No-one cares. Except people with access needs, of course. https://github.com/facebook/react-native/issues/31820
Tyre mobility kit (spare tyre substitute) says to read the manual for instructions. We check the manual. Not under Tyre. Not under Puncture. Not under Tyre Mobility Kit. Not under Flat.
It's under I. For 'If'. Of course.
LB (https://phpc.social/@elazar/113402568468392900)
Please, as an absolute minimum to participate in society,
*Mask if you know you're sick*
Absolute. Bare. Minimum.
Opinie: Wrang dat postcovidcentra ME-patiënten weren https://www.volkskrant.nl/columns-opinie/opinie-wrang-dat-postcovidcentra-me-patienten-weren~b9b34816/
Technical debt collector and general hype-hater. Early 30s, non-binary, ND, poly, relationship anarchist, generally queer.
- No alt text (request) = no boost.
- Boosts OK for all boostable posts.
- DMs are open.
- Flirting welcome, but be explicit if you want something out of it!
- The devil doesn't need an advocate; no combative arguing in my mentions.
Sometimes horny on main (behind CW), very much into kink (bondage, freeuse, CNC, and other stuff), and believe it or not, very much a submissive bottom :p
My spoons are limited, so I may not always have the energy to respond to messages.
Strong views about abolishing oppression, hierarchy, agency, and self-governance - but I also trust people by default and give them room to grow, unless they give me reason not to. That all also applies to technology and how it's built.