Skip to content

Encrypt passwords using bcrypt, keep sha256 for backwards compatibility#26

Open
Jonny007-MKD wants to merge 1 commit intosonicnkt:mainfrom
Jonny007-MKD:main7
Open

Encrypt passwords using bcrypt, keep sha256 for backwards compatibility#26
Jonny007-MKD wants to merge 1 commit intosonicnkt:mainfrom
Jonny007-MKD:main7

Conversation

@Jonny007-MKD
Copy link

The number of rounds can be specified by BCRYPT_ROUNDS environment variable. The default value is 14, as it takes 600 ms on my machine. As we currently only support bcrypt and plain sha256 hashes, we can distinguish them by the leading '$' of bcrypt hashes. Upgrading hashes on login is not yet implemented.

@sonicnkt
Copy link
Owner

Thanks for the contribution. As i merged some other PRs first there is now a VERY minimal conflict. If you have the time to fix this in your branch i will merge it right away otherwise i will probably do it myself in the next days as i want to get into glauth-ui dev again.

Any plans for implementing automatic password migration? Otherwise i will add a function for this to the login mechanism myself :)

The number of rounds can be specified by BCRYPT_ROUNDS environment variable. The default value is 14, as it takes 600 ms on my machine.
As we currently only support bcrypt and plain sha256 hashes, we can distinguish them by the leading '$' of bcrypt hashes.
Upgrading hashes on login is not yet implemented.
@Jonny007-MKD
Copy link
Author

done :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants