Skip to content

Commit 17264d3

Browse files
committed
Added threshold_warning_min_entropy option in docs
1 parent f5e00a8 commit 17264d3

File tree

2 files changed

+3
-1
lines changed

2 files changed

+3
-1
lines changed

README.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -347,6 +347,7 @@ plugins:
347347
#reload_scripts:
348348
# - '#theme'
349349
password_file: 'passwords.yml' # file with password inventory
350+
threshold_warning_min_entropy: 100 # warn if password entropy is below this value
350351
#kdf_pow: 4 # default for crypto-js: 4, default for webcrypto: 5
351352
sign_files: 'encryptcontent-plugin.json' # save ed25519 signatures here
352353
#hash_filenames: # add hash to file names of assets (to make them impossible to guess
@@ -1088,4 +1089,4 @@ all files and verify the signatures.
10881089
As long as the private key used for signing remains secret, the canary script will be able to determine
10891090
if someone tampered with the files on the server. But you should run the canary script from another machine
10901091
that is not related to the server, otherwise the attacker could also modify the canary script and sign with his
1091-
private key instead.
1092+
private key instead.

documentation/docs/usage.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -226,6 +226,7 @@ plugins:
226226
#reload_scripts:
227227
# - '#theme'
228228
password_file: 'passwords.yml' # file with password inventory
229+
threshold_warning_min_entropy: 100 # warn if password entropy is below this value
229230
#kdf_pow: 4 # default for crypto-js: 4, default for webcrypto: 5
230231
sign_files: 'encryptcontent-plugin.json' # save ed25519 signatures here
231232
#hash_filenames: # add hash to file names of assets (to make them impossible to guess

0 commit comments

Comments
 (0)