Christian Heimes <li...@cheimes.de> added the comment:

You are arguing from the perspective of a Django/werkzeug developer and you are 
using experiential domain knowledge to argue for higher recommendation.

I'm asking for a scientific answer. Based on my experience 100k PBKDF2 
HMAC-SHA256 rounds is already a DoS issue for some use cases. For other uses 
cases even 500k rounds is not the right answer, because the application should 
rather use a different algorithm all together.

If you are concerned about PBKDF2's strength, then better switch to Scrypt or 
Argon2. They are better suited against GPU-based crackers. PBKDF2 is still 
required for FIPS compliance, but most people can (and should!) ignore FIPS.

----------

_______________________________________
Python tracker <rep...@bugs.python.org>
<https://bugs.python.org/issue42982>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to