Verdaccio: [SECURITY] Insecure password hashing

Created on 18 May 2017  路  4Comments  路  Source: verdaccio/verdaccio

My reason:

App Version:

all

Solution

use a hashing algorithm made for password hashing: (pbkdf2, bcrypt, scrypt).

I would suggest bcrypt (npm bcrypt), It will automatically take care of adding a salt!

Conclusion

get your crypto together this app is highly insecure currently

fixed auth outdated feature request

All 4 comments

I think the code is just confusing and should probably be re-written.

If you trace through what actually happens, crypt3 is required, and used by default, and that uses sha512 with a salt. So it is secure. Just needs a re-write for clarity.

Something to have on mind for #192

This thread has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs.

Was this page helpful?
0 / 5 - 0 ratings