Application Development and Automation Discussions
Join the discussions or start your own on all things application development, including tools and APIs, programming models, and keeping your skills sharp.
cancel
Showing results for 
Search instead for 
Did you mean: 
Read only

Password hash algorithm

0 Likes
4,951

Hello frank.buchholz

I was wondering, when reading the updated SAP security baseline template (btw good to see that it is updated regularly), SAP advises to use the SHA-512 salt with 15.000 iterations (encoding=RFC2307, algorithm=iSSHA-512, iterations=15000, saltsize=256).

How did you determined that this number has to be 15000?

OWASP says: 'at least 10000, but values to 100000 and up may be appropriate', where I advise my clients to use 200000 and up).

https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#salting

3 REPLIES 3
Read only

0 Likes
3,516

Hello Roy,

this recommendation _might_ be based on the new "secure by default" installation option SAP offer when you install new systems. You might also check RZ11 entry for parameter

login/password_hash_algorithm

For instance, in an S/4 2020 system you will find the following new line (and a reference to SAP note "2140269 - ABAP password hash: supporting salt sizes up to 256 bits"):

Recommended Value = encoding=RFC2307, algorithm=iSSHA-512, iterations=15000, saltsize=256
Read only

JoeGoerlich
Active Contributor
0 Likes
3,516

The work factor for the password hashing algorithm comes down to performance versus security. Since we are talking about passwords, the user has to wait till the hashing has finished before the password is accepted. I guess the number of iterations chosen as default shall make sure that most people don’t notice a delay during an authentication. The default value must also consider a variety of different kind of available performance on the application server.

In the end it’s a configurable value. You are free to adjust it to the available performance on your server in dependence of the max concurrent authentication operations on a max peak business day.


Read only

huberda
Explorer
3,516

Also interesting is this new kernel-feature that was just released:

3143705 - Silent migration of iterated random-salted password hashes when configuration is hardened