You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The encrypt function now selects a random algorithm from recommended
algorithms list instead to have default one. This enables to have additional
security layer having more than one algorithm to be broken for recover
all passwords. This behavior is different from previous one and you should
care about it. If you want the previous behavior, just preselect the
prefered cipher passing it explicitly to the encrypt function.
The bcrypt+sha512 hasher strength is improved.
The previous algorithm is still available for password checking only and
password update setter will be triggered if password with old algorithm
is used for checking process.
The pbkdf2+sha256 hasher strength is improved.
A little weakness is discovered in the implementation that decreases the hash
security from 256 bits to 160 bits (output truncation). This means that
the old password are at least secure as pbkdf2+sha1, that is still
condsidered secure and widele employed (besides, the sha256 hash output
truncated to 160 bits is more secure than sha1, so you don't be worried
about that).
The hasher algorithm is backward compatible and if you are using the builtin
helpers for password upgrading it will be automatically triggered if old
version of password is checked.
Other changes
The pbkdf2+sha3_256 is renamed to pbkdf2+sha3-256. This is a backward
compatible change because the previous alias is still conserved until the next
release.
The md5 and sha256 hashers has been deprecated and will be removed in the
next version.
Add :pbkdf2+blake2b-512 hasher as part of the recommended password hashers.
Add :pbkdf2+sha512 hasher as part of the recommended password hashers.
Add :bcrypt+sha384 hasher (for some one that does not like use blake2b-512).
The :algorithm parameter is deprecated in favor of the shorter :alg.