diff options
author | Lunny Xiao <xiaolunwen@gmail.com> | 2021-02-14 04:19:33 +0800 |
---|---|---|
committer | GitHub <noreply@github.com> | 2021-02-13 21:19:33 +0100 |
commit | c0320065b67439f1c87130a3fcd2f821fc7722bd (patch) | |
tree | d4ef2cbdde54ab7642edc1817045d4f6315f809f /custom/conf | |
parent | a1b74c55092b846f08a3432b313abcc4994b7259 (diff) | |
download | gitea-c0320065b67439f1c87130a3fcd2f821fc7722bd.tar.gz gitea-c0320065b67439f1c87130a3fcd2f821fc7722bd.zip |
Turn default hash password algorightm back to pbkdf2 from argon2 until we found a better one (#14673) (#14675)
* Turn default hash password algorightm back to pbkdf2 from argon2 until we found a better one
* Add a warning on document
Co-authored-by: zeripath <art27@cantab.net>
Diffstat (limited to 'custom/conf')
-rw-r--r-- | custom/conf/app.example.ini | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/custom/conf/app.example.ini b/custom/conf/app.example.ini index f060f13c58..a3349f9865 100644 --- a/custom/conf/app.example.ini +++ b/custom/conf/app.example.ini @@ -548,7 +548,7 @@ ONLY_ALLOW_PUSH_IF_GITEA_ENVIRONMENT_SET = true ;Classes include "lower,upper,digit,spec" PASSWORD_COMPLEXITY = off ; Password Hash algorithm, either "argon2", "pbkdf2", "scrypt" or "bcrypt" -PASSWORD_HASH_ALGO = argon2 +PASSWORD_HASH_ALGO = pbkdf2 ; Set false to allow JavaScript to read CSRF cookie CSRF_COOKIE_HTTP_ONLY = true ; Validate against https://haveibeenpwned.com/Passwords to see if a password has been exposed |