We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
https://github.com/spieker/pink1/blob/master/app/models/user.rb#L19
Default rounds are 5000, I should increase it!
http://blog.codinghorror.com/your-password-is-too-damn-short/
Example: UnixCrypt::SHA512.build('Some secret password', nil, 86000)
UnixCrypt::SHA512.build('Some secret password', nil, 86000)
The text was updated successfully, but these errors were encountered:
In order to prevent DoS, we should limit the maximum password length to 100.
puts Benchmark.measure { p = 'x'*6; 100.times { UnixCrypt::SHA512.build(p, nil, 86000) } } # 37.130000 0.000000 37.130000 ( 37.156434) puts Benchmark.measure { p = 'x'*100; 100.times { UnixCrypt::SHA512.build(p, nil, 86000) } } 55.580000 0.000000 55.580000 ( 55.613038)
This was run on a small Droplet at DigitalOcean.
Sorry, something went wrong.
No branches or pull requests
https://github.com/spieker/pink1/blob/master/app/models/user.rb#L19
Default rounds are 5000, I should increase it!
http://blog.codinghorror.com/your-password-is-too-damn-short/
Example:
UnixCrypt::SHA512.build('Some secret password', nil, 86000)
The text was updated successfully, but these errors were encountered: