Skip to content

Commit

Permalink
[doc] Update Application Security spec with details of renovated sess…
Browse files Browse the repository at this point in the history
…ion and proof of work hashing
  • Loading branch information
evilaliv3 committed Jan 19, 2025
1 parent 221f4d3 commit c32d01c
Showing 1 changed file with 5 additions and 5 deletions.
10 changes: 5 additions & 5 deletions documentation/security/ApplicationSecurity.rst
Original file line number Diff line number Diff line change
Expand Up @@ -38,13 +38,11 @@ The system implements the following password security measures:

Password storage
----------------
Passwords are never stored in plaintext; instead, the system maintains only a hashed version. This applies to all authentication secrets, including whistleblower receipts.
Passwords are never stored on the server either in plaintext or in form on hash; instead, the system maintains only the hash of of a key drived from the user password.

The platform stores users’ passwords hashed with a random 128-bit salt, unique for each user.
Passwords are hashed using `Argon2 <https://en.wikipedia.org/wiki/Argon2>`_ with a configuration of 16 iterations and 128MB of RAM, a per-user salt for each user and a per-system salt for whistleblowers.

Passwords are hashed using `Argon2 <https://en.wikipedia.org/wiki/Argon2>`_, a key derivation function selected as the winner of the `Password Hashing Competition <https://en.wikipedia.org/wiki/Password_Hashing_Competition>`_ in July 2015.

The hash involves a per-user salt for each user and a per-system salt for whistleblowers.
The hashing algorithm used to compute the key hash is SHA256.

Password complexity
-------------------
Expand Down Expand Up @@ -358,6 +356,8 @@ Proof of work on users' sessions
--------------------------------
The system implements an automatic `Proof of Work <https://en.wikipedia.org/wiki/Proof_of_work>`__ based on the hashcash algorithm for every user session, requiring clients to request a token and continuously solve a computational problem to acquire and renew the session.

Specifically the algorithm used to perform the hash is Argon2id with requirement of 1 iteration and 1MB of RAM.

Rate limit on users' sessions
------------------------------
The system implements rate limiting on user sessions, preventing more than 5 requests per second and applying increasing delays on requests that exceed this threshold.
Expand Down

0 comments on commit c32d01c

Please sign in to comment.