Skip to content

Commit f4ab946

Browse files
Link to OWASP page on password storage configuration
Note that configuring them correctly is vital, and point to OWASP's guidance on the matter. Signed-off-by: David A. Wheeler <[email protected]>
1 parent 2ba7ce3 commit f4ab946

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

secure_software_development_fundamentals.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4521,6 +4521,8 @@ If you are using passwords for inbound authentication, for security you **_must_
45214521

45224522
Another algorithm that is in use is scrypt. This should also be strong against hardware attacks, but it has not gotten as much review compared to Argon2id, so Argon2id is more commonly recommended. That said, at the time of this writing, it has no known serious problems.
45234523

4524+
All of these algorithms have various configuration options, and it is vital to use an adequately secure set of options. The OWASP [Password Storage Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html) provides a set of recommended configuration option values.
4525+
45244526
You should allow users to require the use of two-factor authentication (2FA), either directly or by delegating to a service that does.
45254527

45264528
Also, beware of implementing these algorithms only on the client side. It is fine to implement them on the client side (because that prevents the server from ever discovering the password the user enters), as long as they are *also* implemented on the server. The danger is doing them *only* on the client; if that happens, then what is stored in the server is no different from storing passwords in the clear. Once attackers get the password database, they can simply create or modify their own client to log into anyone’s account.

0 commit comments

Comments
 (0)