Open jwr opened 4 years ago
Hello @jwr You are correct, right now buddy-hashers only uses public salt. A private salt is somethig like HMAC mechanism, that allows invalidate all passwords just changing this private salt. We can think on integrate this as an optional feature.
I am going through requirements outlined in NIST SP 800-63B for AAL1, to make sure that my Clojure application is compliant. When going through section "5.1.1.2 Memorized Secret Verifiers", it seems that
:bcrypt+sha512
does fulfill all the requirements, except for:As far as I know this is not something that buddy-hashers does at this point?
The NIST guidelines can be found at https://pages.nist.gov/800-63-3/sp800-63b.html and seem not only very reasonable and well-written, but also a rather convenient set of rules that we could all adhere to.