File tree Expand file tree Collapse file tree 2 files changed +3
-1
lines changed
Expand file tree Collapse file tree 2 files changed +3
-1
lines changed Original file line number Diff line number Diff line change @@ -347,6 +347,7 @@ plugins:
347347 #reload_scripts:
348348 # - '#theme'
349349 password_file: 'passwords.yml' # file with password inventory
350+ threshold_warning_min_entropy: 100 # warn if password entropy is below this value
350351 #kdf_pow: 4 # default for crypto-js: 4, default for webcrypto: 5
351352 sign_files: 'encryptcontent-plugin.json' # save ed25519 signatures here
352353 #hash_filenames: # add hash to file names of assets (to make them impossible to guess
@@ -1088,4 +1089,4 @@ all files and verify the signatures.
10881089As long as the private key used for signing remains secret, the canary script will be able to determine
10891090if someone tampered with the files on the server. But you should run the canary script from another machine
10901091that is not related to the server, otherwise the attacker could also modify the canary script and sign with his
1091- private key instead.
1092+ private key instead.
Original file line number Diff line number Diff line change @@ -226,6 +226,7 @@ plugins:
226226 #reload_scripts:
227227 # - '#theme'
228228 password_file: 'passwords.yml' # file with password inventory
229+ threshold_warning_min_entropy: 100 # warn if password entropy is below this value
229230 #kdf_pow: 4 # default for crypto-js: 4, default for webcrypto: 5
230231 sign_files: 'encryptcontent-plugin.json' # save ed25519 signatures here
231232 #hash_filenames: # add hash to file names of assets (to make them impossible to guess
You can’t perform that action at this time.
0 commit comments