Skip to content

Instantly share code, notes, and snippets.

@tadasy
Created April 19, 2011 14:22
Show Gist options
  • Save tadasy/928005 to your computer and use it in GitHub Desktop.
Save tadasy/928005 to your computer and use it in GitHub Desktop.
# Repeated applications of the hash make brute force (even with a compromised
# database and site key) harder, and scale with Moore's law.
#
# bq. "To squeeze the most security out of a limited-entropy password or
# passphrase, we can use two techniques [salting and stretching]... that are
# so simple and obvious that they should be used in every password system.
# There is really no excuse not to use them." http://tinyurl.com/37lb73
# Practical Security (Ferguson & Scheier) p350
#
# A modest 10 foldings (the default here) adds 3ms. This makes brute forcing 10
# times harder, while reducing an app that otherwise serves 100 reqs/s to 78 signin
# reqs/s, an app that does 10reqs/s to 9.7 reqs/s
#
# More:
# * http://www.owasp.org/index.php/Hashing_Java
# * "An Illustrated Guide to Cryptographic Hashes":http://www.unixwiz.net/techtips/iguide-crypto-hashes.html
REST_AUTH_DIGEST_STRETCHES = 10
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment