Open GoogleCodeExporter opened 9 years ago
Along with or in addition to this, there is the concept of an "obese pepper",
as laid out by Solar Designer in a slideshow presentation (todo: add link to
this), derived from the memory-hard ROMix portion of SCrypt. The core idea is
to create a pepper many gigabytes in size, but use only small (state-dependant)
portions of it in a given hash - making stealing the pepper time-prohibitive
for an attacker.
Original comment by elic@astllc.org
on 18 Feb 2013 at 5:28
Just to add a few more references --
Mozilla apparently has a
[https://wiki.mozilla.org/WebAppSec/Secure_Coding_Guidelines#Password_Storage
Password Storage] document recommending the use of peppers, and a
[https://github.com/fwenzel/django-sha2 reference implmentation] on github.
Original comment by elic@astllc.org
on 21 Sep 2013 at 9:14
Shored up plans for 1.7 release, feel this strongly needs inclusion. Looking
into things, this will probably involve a couple of steps:
1) standard pepper api for the hashes (via settings & context kwds),
2) pepper config options for CryptContext, and
3) add a new hash or hashes (e.g. based on bcrypt/scrypt/pbkdf2) which can
support thse. ``kdf(hmac_sha256(msg=pepper, key=saslprep(password)))`` should
be a sufficient basis for a simple pepper.
4) I still want to investigate obese pepper concept, but that should perhaps be
delayed until a later release.
Original comment by elic@astllc.org
on 26 Dec 2013 at 9:48
Original issue reported on code.google.com by
elic@astllc.org
on 28 Jun 2012 at 8:55