How unsafe is this?

We are looking for reviews. I am creating a django application where users are provided with randomly generated passwords.

Currently, a password is generated using the make_random_password () function in django auth.

However, early feedback is that emails are too difficult to remember (even if users can change them).

This is a closed (invitation) application, but it lives on the Internet. Only about 600 users. I had a solution which, in my opinion, is somewhat uncertain, but I wanted to run it with SO users as it solves the feedback problem.

In my settings.py file, I created two lists, one containing about 20 machine names, and the other about 40 verbs (which are capital letters).

I was going to randomly select one from each list, combine them together, and then add a few random characters to the end.

All passwords will be at least 9 characters long and are saved by hash using the django set_password () function

The biggest problem that I see is that if someone gets access to the SFTP server, they will have access to my code AND, therefore, a template for hacking pwords.

BUT they will also have access to db, etc., so what is the real problem?

+3
source share
4 answers

, . , , . Obscurity , .

, . , 40 , .

9.6 (= log2 (20) + log2 (40)) . 2 . .

+8

? , , ? , , , , , .

+3

OpenID, . Django . , OpenID, auth, ...

+3

The concept of creating random password generation if you have a flag indicating which random password generation template is used to generate the password, since you need to check the password in subsequent entries. You do it? If yes, then add the salting pattern to make it safe, and finally, the hash of the common salt generated will be safer. Try it.

+1
source

Source: https://habr.com/ru/post/1786147/


All Articles