You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Feb 18, 2024. It is now read-only.
Password hashes are created with crypto.createHmac(passwordAlgorithm, passwordSecret).update(password), which is not a secure way of storing passwords.
Notably, two users who have the same password will share the same password hash:
Instead, passwords should be stored with a random salt and an intentionally expensive validation function such as PBKDF2. Using a password secret is probably not necessary.
The text was updated successfully, but these errors were encountered:
@ModellbahnFreak fyi
Currently, the authentication part of CCIMS is highly problematic, not only from a security standpoint, but also from a usability standpoint.
Therefore, we plan to switch to a dedicated authentication server in the near future, probably using the OpenID Connect protocol.
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Password hashes are created with
crypto.createHmac(passwordAlgorithm, passwordSecret).update(password)
, which is not a secure way of storing passwords.Notably, two users who have the same password will share the same password hash:
Instead, passwords should be stored with a random salt and an intentionally expensive validation function such as PBKDF2. Using a password secret is probably not necessary.
The text was updated successfully, but these errors were encountered: