#35428: ScryptPasswordHasher parallelism parameter is lower than the recommended in OWASP -------------------------------------+------------------------------------- Reporter: Natalia | Owner: nobody Bidart | Type: | Status: new Cleanup/optimization | Component: | Version: dev contrib.auth | Severity: Normal | Keywords: hashers iterations Triage Stage: | Has patch: 0 Unreviewed | Needs documentation: 0 | Needs tests: 0 Patch needs improvement: 0 | Easy pickings: 0 UI/UX: 0 | -------------------------------------+------------------------------------- Following this [https://forum.djangoproject.com/t/stop-increasing-default- pbkdf2-iteration-count/25539/7 forum thread on password hashers iterations/parameters], it was agreed that the current `parallelism` parameter for `ScryptPasswordHasher` should be increased to 5. Alternatively we could switch to `N=2^16 (64 MiB), r=8 (1024 bytes), p=2` or `N=2^15 (32 MiB), r=8 (1024 bytes), p=3`.
Source: https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#scrypt -- Ticket URL: <https://code.djangoproject.com/ticket/35428> Django <https://code.djangoproject.com/> The Web framework for perfectionists with deadlines. -- You received this message because you are subscribed to the Google Groups "Django updates" group. To unsubscribe from this group and stop receiving emails from it, send an email to django-updates+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/django-updates/0107018f3fc8d0a5-cbfda310-4957-40c5-9d05-c5ba500cbbf7-000000%40eu-central-1.amazonses.com.