-
Notifications
You must be signed in to change notification settings - Fork 374
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Yesod.Auth.Util.PasswordStore update? #1675
Comments
If someone is interested in taking a crack at moving this over to |
Thank you for the kind words. The only thing this module seems to do that |
It's simply meant to provide the functionality of pwstore-fast that we needed in yesod-auth |
Aaah, I see, I didn't notice it was used in other modules of Ok, so if the Come to think of it. The This probably will also make it impossible to have a default definition of |
In Is there any combination of parameters which makes the |
Supporting different hashes is also on the roadmap, but at the moment there's no way to do that. You can see in this list that tons of different ways are used of constructing a hash with its parameters. TL;DR support for different hash formats somewhere in the future. |
@Vlix Yes, I know! But I had hoped to be able to reproduce the hash part of the result. I am the maintainer of However, it isn't possible, since I had failed to spot that, despite implementing I am certainly not against deprecating |
Ah, right. I also forgot about that. It's gonna be pretty difficult changing away from PBKDF1/2 and giving the user more choice in which algorithm they'd like to use without breaking existing use cases. If I have time (and don't forget), I might take a stab at the |
We've been working hard on the password-2.0 package and it might be a good idea to revisit the
Yesod.Auth.Util.PasswordStore
module, since it's not been touched for 3 years (and hasn't actually changed since 2014, when it was copied wholesale frompwstore-fast
) and uses PBKDF, which, as far as I can gather from "the internet", is not the best way to store passwords nowadays.There could be legitimate reasons to keep the module as it is, of course, but I just wanted to give a heads up.
(
password-2.0
also usescryptonite
so it wouldn't induce a significant dependency burden, IMHO)The text was updated successfully, but these errors were encountered: