I see, I really had not give much though to the points that you make.
I guess the secret salt really does create some possible inconvenience
and should be feature left up to developers to implement as you say.
Thanks for the input.

On Dec 7, 6:37 pm, Ian Kelly <ian.g.ke...@gmail.com> wrote:
> On Tue, Dec 7, 2010 at 2:27 PM, andy <flowar...@gmail.com> wrote:
> > However I'm a bit curious about the significance of adding a second
> > salt to the password before it is hashed and then using the regular
> > per-user salt. Currently my opinion is that their is added benefit
> > since it make dictionary attacks more challenging and possibly almost
> > impossibly if the attacker does not know the hidden salt. Django has a
> > secretKey in the setting file I wondering why this could not have been
> > used as second salt in the authentication system.
>
> The problem with this is that if you ever have to change your secret
> key (e.g., your settings.py file is compromised), then all passwords
> will be invalidated.  And not in a friendly way, either.  With
> per-user salts, if you need to invalidate a user's password, you can
> allow them to log in with the old password and then require them to
> change their password.  With a secret key in the salt, if you change
> the secret key, then the old passwords will no longer work at all.
>
> Some users may not mind this, but it would be undesirable for core.

-- 
You received this message because you are subscribed to the Google Groups 
"Django developers" group.
To post to this group, send email to django-develop...@googlegroups.com.
To unsubscribe from this group, send email to 
django-developers+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/django-developers?hl=en.

Reply via email to