#35428: ScryptPasswordHasher parallelism parameter is lower than the 
recommended in
OWASP
-------------------------------------+-------------------------------------
               Reporter:  Natalia    |          Owner:  nobody
  Bidart                             |
                   Type:             |         Status:  new
  Cleanup/optimization               |
              Component:             |        Version:  dev
  contrib.auth                       |
               Severity:  Normal     |       Keywords:  hashers iterations
           Triage Stage:             |      Has patch:  0
  Unreviewed                         |
    Needs documentation:  0          |    Needs tests:  0
Patch needs improvement:  0          |  Easy pickings:  0
                  UI/UX:  0          |
-------------------------------------+-------------------------------------
 Following this [https://forum.djangoproject.com/t/stop-increasing-default-
 pbkdf2-iteration-count/25539/7 forum thread on password hashers
 iterations/parameters], it was agreed that the current `parallelism`
 parameter for `ScryptPasswordHasher` should be increased to 5.
 Alternatively we could switch to `N=2^16 (64 MiB), r=8 (1024 bytes), p=2`
 or `N=2^15 (32 MiB), r=8 (1024 bytes), p=3`.

 Source:
 
https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#scrypt
-- 
Ticket URL: <https://code.djangoproject.com/ticket/35428>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.

-- 
You received this message because you are subscribed to the Google Groups 
"Django updates" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to django-updates+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/django-updates/0107018f3fc8d0a5-cbfda310-4957-40c5-9d05-c5ba500cbbf7-000000%40eu-central-1.amazonses.com.

Reply via email to