summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorChristiaan Conover <cconover@gitlab.com>2019-08-21 22:24:12 +0000
committerChristiaan Conover <cconover@gitlab.com>2019-08-22 12:02:31 -0400
commit2ed065885cbdc5ed5334f1adfbfe2b82895bd146 (patch)
tree1663e7aec842de0bb3025b06d5a2a3687028c9ac
parentb316fb6fd798cac32938560d78349c21d8920ddf (diff)
downloadgitlab-ce-2ed065885cbdc5ed5334f1adfbfe2b82895bd146.tar.gz
Fix a typo in the section on stretching
Correct a typo in the description of how passwords are stretched.
-rw-r--r--doc/security/password_storage.md4
1 files changed, 2 insertions, 2 deletions
diff --git a/doc/security/password_storage.md b/doc/security/password_storage.md
index b5c021bf5de..f54e4022062 100644
--- a/doc/security/password_storage.md
+++ b/doc/security/password_storage.md
@@ -9,5 +9,5 @@ GitLab stores user passwords in a hashed format, to prevent passwords from being
GitLab uses the [Devise](https://github.com/plataformatec/devise) authentication library, which handles the hashing of user passwords. Password hashes are created with the following attributes:
- **Hashing**: the [bcrypt](https://en.wikipedia.org/wiki/Bcrypt) hashing function is used to generate the hash of the provided password. This is a strong, industry-standard cryptographic hashing function.
-- **Stretching**: Password hashes are [stretched](https://en.wikipedia.org/wiki/Key_stretching) to harden against brute-force attacks. GitLab uses a streching factor of 10 by default.
-- **Salting**: A [cryptographic salt](https://en.wikipedia.org/wiki/Salt_(cryptography)) is added to each password to harden against pre-computed hash and dictionary attacks. Each salt is randomly generated for each password, so that no two passwords share a salt to further increase security. \ No newline at end of file
+- **Stretching**: Password hashes are [stretched](https://en.wikipedia.org/wiki/Key_stretching) to harden against brute-force attacks. GitLab uses a stretching factor of 10 by default.
+- **Salting**: A [cryptographic salt](https://en.wikipedia.org/wiki/Salt_(cryptography)) is added to each password to harden against pre-computed hash and dictionary attacks. Each salt is randomly generated for each password, so that no two passwords share a salt to further increase security.