I agree, and my basic idea was to enable the use of a stronger algo
than sha1, which is breakable too. Hashlib supports sha256 and sha
512. As I said in the ticket comment adding the app secret key could
mitigete the danger of a brute force attack on the sql dump of the
database.

On 29 Ago, 20:29, Tim Chase <[EMAIL PROTECTED]> wrote:
> > Maybe I'm wrong but this patch define DEFAULT_ALGO at "django
> > installation" level. I think it shoud be defined at prject level.
> > something like this
>
> >>>> try:
> > ...     DEFAULT_ALGO = settings.DEFAULT_ALGO
> > ... except NameError:
> > ...     DEFAULT_ALGO = 'sha1'
>
> > does refer to project settings have some side issues I can't see?
>
> I'm of two minds on this:
>
> 1) it's nice to be able to set it once and forget it; as such,
> the above 4 lines are a nice addition.
>
> 2) MD5 andcrypthave known problems[1][2] so I can see
> justification in setting up roadblocks to change from SHA1 to a
> weaker alternative.  Seeing calls in the code explicitly
> requesting "crypt" or "md5" force the developer to make it clear
> that they *really* *do* want this weaker alternative -- even if
> it violates DRY.
>
> -tim
>
> [1]http://en.wikipedia.org/wiki/Md5
>
> [2]http://en.wikipedia.org/wiki/Crypt_(Unix)
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Django users" group.
To post to this group, send email to django-users@googlegroups.com
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at 
http://groups.google.com/group/django-users?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to