Skip to content
This repository has been archived by the owner on Feb 22, 2024. It is now read-only.

SECURITY_PASSWORD_SALT when using bcrypt #470

Closed
genxstylez opened this issue Jan 19, 2016 · 3 comments
Closed

SECURITY_PASSWORD_SALT when using bcrypt #470

genxstylez opened this issue Jan 19, 2016 · 3 comments

Comments

@genxstylez
Copy link

as titled, I believe bcrypt generates its own salt every time the password is generated. I think it's better to detect if bcrypt is used then there should not be a runtime error like the one below.

RuntimeError: The configuration valueSECURITY_PASSWORD_SALTmust not be None when the value ofSECURITY_PASSWORD_HASHis set to "bcrypt
related: #268

@DeimosA
Copy link

DeimosA commented Feb 28, 2016

SECURITY_PASSWORD_SALT is used for "double salting" or "salting & peppering" (whatever you prefer). This is a common salt used in addition to the salt that bcrypt (or other algorithms) generate.

@mattupstate
Copy link
Collaborator

Thanks @DeimosA for explaining this.

@jplatte
Copy link

jplatte commented Jan 4, 2018

Why is this done though? A quick lookup of "double salting" turns up this SO question with only one answer implying that it is basically useless.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Development

No branches or pull requests

4 participants