#30561: Time for peppering user passwords in Django?
-----------------------------------------+------------------------
               Reporter:  linluc         |          Owner:  nobody
                   Type:  New feature    |         Status:  new
              Component:  Uncategorized  |        Version:  2.2
               Severity:  Normal         |       Keywords:
           Triage Stage:  Unreviewed     |      Has patch:  0
    Needs documentation:  0              |    Needs tests:  0
Patch needs improvement:  0              |  Easy pickings:  0
                  UI/UX:  0              |
-----------------------------------------+------------------------
 Peppering passwords has been a controversial topic  widely discussed in
 many stack overflow questions. Having ran my 20+ personal email addresses
 through HIBP page the findings are clear: all emails/passwords of mine
 that had been leaked fall in the following categories: SQL injections,
 mis-configured databases, exposed database admin panels or strayed
 database backup files.

 And that’s exactly what a pepper value in the hashing process is
 protecting from. Breaching  the whole server with physical access to the
 file system is rather rare nowadays.

 According to this NIST document [ Digital Identity Guidelines
 Authentication and Lifecycle Management]

 “In addition, verifiers SHOULD perform an additional iteration of a key
 derivation function using a salt value that is secret and known only to
 the verifier.”

 So, why not in Django?

-- 
Ticket URL: <https://code.djangoproject.com/ticket/30561>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.

-- 
You received this message because you are subscribed to the Google Groups 
"Django updates" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/django-updates/049.669e6823dc5c62c682ced1bc8a193bd7%40djangoproject.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to