Skip to content

enhance: bump token keyspace to >128 bits#939

Merged
eternal-flame-AD merged 1 commit intomasterfrom
larger-token-space
Mar 29, 2026
Merged

enhance: bump token keyspace to >128 bits#939
eternal-flame-AD merged 1 commit intomasterfrom
larger-token-space

Conversation

@eternal-flame-AD
Copy link
Copy Markdown
Member

Previous keyspace: 2^84.3131 (2.40e25) , we are moving to 2^132.5 keyspace (7.65e+39)

Closes #936

The original length is indeed on the legacy end of the spectrum and slightly behind OWASP recommendations for a password without MFA , therefore I think it's good to bump it to >128 bits to push it well into cryptographic secret strength that TLS/SSH accepts and collision resistance on SHA256 is targeted at. Maybe this can also simplify some workflows if some users want's to built ad hoc E2EE systems.

Regardng the proposal in #936 I don't see the need to add a token length option because the "ceiling" of security (TLS) is clear and achievable by simply bumping the constant. Creating a knob can lead to downstream problems like tokens too long causing them to not fit in certain webhook forms, etc.

The increase in character count is modest, so I don't expect any issues with URL or webhook form length not fitting, but after the increase we can confidently say at least regarding the brute force attack vector TLS would be the weakest link by every metric.

@eternal-flame-AD eternal-flame-AD requested a review from a team as a code owner March 28, 2026 14:54
@codecov
Copy link
Copy Markdown

codecov Bot commented Mar 28, 2026

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 78.70%. Comparing base (0610537) to head (1051f3f).
⚠️ Report is 1 commits behind head on master.

Additional details and impacted files
@@           Coverage Diff           @@
##           master     #939   +/-   ##
=======================================
  Coverage   78.70%   78.70%           
=======================================
  Files          57       57           
  Lines        2517     2517           
=======================================
  Hits         1981     1981           
  Misses        397      397           
  Partials      139      139           

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

Copy link
Copy Markdown
Member

@jmattheis jmattheis left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍

@eternal-flame-AD eternal-flame-AD merged commit 1434380 into master Mar 29, 2026
4 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Development

Successfully merging this pull request may close these issues.

Feature Request: Add GOTIFY_TOKEN_LENGTH configuration option

2 participants