diff options
author | Lunny Xiao <xiaolunwen@gmail.com> | 2021-02-14 01:03:29 +0800 |
---|---|---|
committer | GitHub <noreply@github.com> | 2021-02-13 18:03:29 +0100 |
commit | 5e4fa7c703726cfc18ce8741a5d829173f3fec5c (patch) | |
tree | f8e6f1965d04f5f39979a269f95d260b351a9b89 /custom | |
parent | ed834126a67aabbe027495d6a79fe415a4be7890 (diff) | |
download | gitea-5e4fa7c703726cfc18ce8741a5d829173f3fec5c.tar.gz gitea-5e4fa7c703726cfc18ce8741a5d829173f3fec5c.zip |
Turn default hash password algorightm back to pbkdf2 from argon2 until we found a better one (#14673)
* Turn default hash password algorightm back to pbkdf2 from argon2 until we found a better one
* Add a warning on document
Diffstat (limited to 'custom')
-rw-r--r-- | custom/conf/app.example.ini | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/custom/conf/app.example.ini b/custom/conf/app.example.ini index 747173b5ae..276b3cb5e8 100644 --- a/custom/conf/app.example.ini +++ b/custom/conf/app.example.ini @@ -565,7 +565,7 @@ ONLY_ALLOW_PUSH_IF_GITEA_ENVIRONMENT_SET = true ;Classes include "lower,upper,digit,spec" PASSWORD_COMPLEXITY = off ; Password Hash algorithm, either "argon2", "pbkdf2", "scrypt" or "bcrypt" -PASSWORD_HASH_ALGO = argon2 +PASSWORD_HASH_ALGO = pbkdf2 ; Set false to allow JavaScript to read CSRF cookie CSRF_COOKIE_HTTP_ONLY = true ; Validate against https://haveibeenpwned.com/Passwords to see if a password has been exposed |