Replies: 1 comment 4 replies
-
Yes, this is a known issue with bcrypt. 72 bytes is generally going to be way more than enough to ensure security, so the only time this would be an issue is if:
If your password is less than 72 bytes, this isn't an issue. If your password is fully disclosed, you would be vulnerable anyway. Either of those two cases seems unlikely, and the combination seems exceptionally rare. However, I don't have a problem with adding a |
Beta Was this translation helpful? Give feedback.
4 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I recently encountered this article, which warns that passwords longer than 72 bytes will be truncated when hashed via bcrypt. So, I was wondering whether Rodauth should validate maximum password length by deafult when using bcrypt. This would have to be adjusted in the password pepper feature to account for the pepper length, and can be removed for argon2, which effectively doesn't have a limit.
Beta Was this translation helpful? Give feedback.
All reactions