You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently a BCrypt implementation is used to store long-term client secrets for OAuth. This uses a fixed cost factor (security.encryption.loadFactor) with a fixed salt (security.passcode.salt), that can be adjusted in the configuration - but is not stored per client secret and thus not adjustable (to the best of my understanding).
I would suggest to make
the salt random per password
the cost dynamic, so that global changes to the cost should lead to rehashing client secrets hashed with different costs on usage.
The text was updated successfully, but these errors were encountered:
Update: It seems that salt+cost is actually stored per client secret. But it's not random per password, as long as security.passcode.salt is set. And it's not updated with an updated cost factor.
Currently a BCrypt implementation is used to store long-term client secrets for OAuth. This uses a fixed cost factor (
security.encryption.loadFactor
) with a fixed salt (security.passcode.salt
), that can be adjusted in the configuration - but is not stored per client secret and thus not adjustable (to the best of my understanding).I would suggest to make
The text was updated successfully, but these errors were encountered: