[feat] Use Argon2 password hashes #403
Labels
No labels
approved, awaiting change
bug
configuration
documentation
duplicate
enhancement
extremely low priority
feature request
Fix it yourself
help wanted
invalid
mastodon_api
needs docs
needs tests
not a bug
planned
pleroma_api
privacy
question
static_fe
triage
wontfix
No milestone
No project
No assignees
2 participants
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: AkkomaGang/akkoma#403
Loading…
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
The idea
Akkoma should use a more modern password hashing algorithm like Argon2 to make passwords harder to crack in the event of a database leak.
There is an Elixir implementation of Argon2: https://hex.pm/packages/argon2_elixir.
The reasoning
Akkoma currently uses PBKDF2 as its password hashing algorithm. However, it relatively easy to brute force with GPUs and ASICs compared to more modern hashing algoirthms.
Have you searched for this feature request?
yes 100% i want to do this
did you know there's backwards compat for passwords like 3 hashing schemes back? (https://akkoma.dev/AkkomaGang/akkoma/src/branch/develop/lib/pleroma/web/plugs/authentication_plug.ex#L41)
there shouldn't be :aaaa:
implemented via
9be6caf125