diff options
author | Christiaan Conover <cconover@gitlab.com> | 2019-08-22 12:07:19 -0400 |
---|---|---|
committer | Christiaan Conover <cconover@gitlab.com> | 2019-08-22 12:07:19 -0400 |
commit | a6d04d48697270b61b3a57e15a87c97c0fc6e355 (patch) | |
tree | 3886a27deef265488d190c0837bb5dd7b95f556d /doc/security | |
parent | 2ed065885cbdc5ed5334f1adfbfe2b82895bd146 (diff) | |
download | gitlab-ce-a6d04d48697270b61b3a57e15a87c97c0fc6e355.tar.gz |
Improve readability of salting descriptiondocs-password-storage
Add a comma in the final sentence of the description of salting, to
improve the readability of what's being said.
Diffstat (limited to 'doc/security')
-rw-r--r-- | doc/security/password_storage.md | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/security/password_storage.md b/doc/security/password_storage.md index f54e4022062..f4e32f96f7b 100644 --- a/doc/security/password_storage.md +++ b/doc/security/password_storage.md @@ -10,4 +10,4 @@ GitLab uses the [Devise](https://github.com/plataformatec/devise) authentication - **Hashing**: the [bcrypt](https://en.wikipedia.org/wiki/Bcrypt) hashing function is used to generate the hash of the provided password. This is a strong, industry-standard cryptographic hashing function. - **Stretching**: Password hashes are [stretched](https://en.wikipedia.org/wiki/Key_stretching) to harden against brute-force attacks. GitLab uses a stretching factor of 10 by default. -- **Salting**: A [cryptographic salt](https://en.wikipedia.org/wiki/Salt_(cryptography)) is added to each password to harden against pre-computed hash and dictionary attacks. Each salt is randomly generated for each password, so that no two passwords share a salt to further increase security. +- **Salting**: A [cryptographic salt](https://en.wikipedia.org/wiki/Salt_(cryptography)) is added to each password to harden against pre-computed hash and dictionary attacks. Each salt is randomly generated for each password, so that no two passwords share a salt, to further increase security. |