The Passlib documentation has moved to https://passlib.readthedocs.io

passlib.hash.bsdi_crypt - BSDi Crypt

Danger

This algorithm is not considered secure by modern standards. It should only be used when verifying existing hashes, or when interacting with applications that require this format. For new code, see the list of recommended hashes.

This algorithm was developed by BSDi for their BSD/OS distribution. It’s based on des_crypt, and contains a larger salt and a variable number of rounds. This algorithm is also known as “Extended DES Crypt”. It class can be used directly as follows:

>>> from passlib.hash import bsdi_crypt

>>> # generate new salt, hash password
>>> hash = bsdi_crypt.hash("password")
>>> hash
'_7C/.Bf/4gZk10RYRs4Y'

>>> # same, but with explict number of rounds
>>> bsdi_crypt.using(rounds=10001).hash("password")
'_FQ0.amG/zwCMip7DnBk'

>>> # verify password
>>> bsdi_crypt.verify("password", hash)
True
>>> bsdi_crypt.verify("secret", hash)
False

See also

the generic PasswordHash usage examples

Interface

class passlib.hash.bsdi_crypt

This class implements the BSDi-Crypt password hash, and follows the PasswordHash API.

It supports a fixed-length salt, and a variable number of rounds.

The using() method accepts the following optional keywords:

Parameters:
  • salt (str) – Optional salt string. If not specified, one will be autogenerated (this is recommended). If specified, it must be 4 characters, drawn from the regexp range [./0-9A-Za-z].
  • rounds (int) – Optional number of rounds to use. Defaults to 5001, must be between 1 and 16777215, inclusive.
  • relaxed (bool) –

    By default, providing an invalid value for one of the other keywords will result in a ValueError. If relaxed=True, and the error can be corrected, a PasslibHashWarning will be issued instead. Correctable errors include rounds that are too small or too large, and salt strings that are too long.

    New in version 1.6.

Changed in version 1.6: hash() will now issue a warning if an even number of rounds is used (see Security Issues regarding weak DES keys).

Note

This class will use the first available of two possible backends:

  • stdlib crypt(), if the host OS supports BSDi-Crypt (primarily BSD-derived systems).
  • a pure Python implementation of BSDi-Crypt built into Passlib.

You can see which backend is in use by calling the get_backend() method.

Format

An example hash (of the string password) is _EQ0.jzhSVeUyoSqLupI. A bsdi_crypt hash string consists of a 20 character string of the form _roundssaltchecksum. All characters except the underscore prefix are drawn from [./0-9A-Za-z].

  • _ - the underscore is used to distinguish this scheme from others, such as des-crypt.
  • rounds is the number of rounds, stored as a 4 character hash64-encoded 24-bit integer (EQ0. in the example).
  • salt is the salt, stored as as a 4 character hash64-encoded 24-bit integer (jzhS in the example).
  • checksum is the checksum, stored as an 11 character hash64-encoded 64-bit integer (VeUyoSqLupI in the example).

A bsdi_crypt configuration string is also accepted by this module; and has the same format as the hash string, but with the checksum portion omitted.

Algorithm

The checksum is formed by a modified version of the DES cipher in encrypt mode:

  1. Given a password string, a salt string, and rounds string.

  2. The 4 character rounds string is decoded to a 24-bit integer rounds value; The rounds string uses little-endian hash64 encoding.

  3. The 4 character salt string is decoded to a 24-bit integer salt value; The salt string uses little-endian hash64 encoding.

  4. The password is NULL-padded on the end to the smallest non-zero multiple of 8 bytes.

  5. The lower 7 bits of the first 8 bytes of the password are used to form a 56-bit integer; with the first byte providing the most significant 7 bits, and the 8th byte providing the least significant 7 bits. This is the DES key.

  6. For each additional block of 8 bytes in the padded password:

    1. The current DES key is encrypted using a single round of normal DES, with itself as the input block.
    2. Step 5 is repeated for the current 8-byte block, and xored against the existing DES key.
  7. Repeated rounds of (modified) DES encryption are performed; starting with a null input block, and using the 56-bit integer from step 5/6 as the DES key.

    The salt is used to to mutate the normal DES encrypt operation by swapping bits i and i+24 in the DES E-Box output if and only if bit i is set in the salt value.

    The number of rounds is controlled by the value decoded in step 2.

  8. The 64-bit result of the last round of step 7 is then lsb-padded with 2 zero bits.

  9. The resulting 66-bit integer is encoded in big-endian order using the hash64-big format.

Security Issues

BSDi Crypt should not be considered sufficiently secure, for a number of reasons:

  • Its use of the DES stream cipher, which is vulnerable to practical pre-image attacks, and considered broken, as well as having too-small key and block sizes.
  • The 24-bit salt is too small to defeat rainbow-table attacks (most modern algorithms provide at least a 48-bit salt).
  • The fact that it only uses the lower 7 bits of each byte of the password restricts the keyspace which needs to be searched.
  • Additionally, even rounds values are slightly weaker still, as they may reveal the hash used one of the weak DES keys [3]. This information could theoretically allow an attacker to perform a brute-force attack on a reduced keyspace and against only 1-2 rounds of DES. (This issue is mitigated by the fact that few passwords are both valid and result in a weak key).

This algorithm is none-the-less stronger than des_crypt itself, since it supports variable rounds, a larger salt size, and uses all the bytes of the password.

Deviations

This implementation of bsdi-crypt differs from others in one way:

  • Unicode Policy:

    The original bsdi-crypt algorithm was designed for 7-bit us-ascii encoding only (as evidenced by the fact that it discards the 8th bit of all password bytes).

    In order to provide support for unicode strings, Passlib will encode unicode passwords using utf-8 before running them through bsdi-crypt. If a different encoding is desired by an application, the password should be encoded before handing it to Passlib.

Footnotes

[1]Primary source used for description of bsdi-crypt format & algorithm - http://fuse4bsd.creo.hu/localcgi/man-cgi.cgi?crypt+3
[2]Another source describing algorithm - http://ftp.lava.net/cgi-bin/bsdi-man?proto=1.1&query=crypt&msection=3&apropos=0
[3]DES weak keys - https://en.wikipedia.org/wiki/Weak_key#Weak_keys_in_DES