Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What you say seems to directly contradict the Wikipedia link above, which says:

"The pepper is randomly generated for each value to be hashed (within a limited set of values), and is never stored. When data is tested against a hashed value for a match, this is done by iterating through the set of values valid for the pepper, and each one in turn is added to the data to be tested (usually by suffixing it to the data), before the cryptographic hash function is run on the combined value."



The talk page mentions "pepper" having two meanings, both of which are mentioned in the article. I wasn't familiar with the one that involves brute-forcing it on every login attempt, and I've never heard of it being used in production on a real site (whereas a global shared secret seems to be reasonably common).


> I wasn't familiar with the one that involves brute-forcing it on every login attempt, and I've never heard of it being used in production on a real site (whereas a global shared secret seems to be reasonably common).

In case you're interested, that is the same scheme as the one used by JoeyH's keysafe[1].

[1]: http://joeyh.name/code/keysafe/




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: