--
Thanks, Shaheed
You received this message because you are subscribed to the Google Groups "Django users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to django-users...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/django-users/CAHAc2jcETxAtMbHfnD1GQFVgWwR8ABOAy%3DjaRuhRW7mQhnOxeQ%40mail.gmail.com.
-- We recommend signal.org Signed email is an absolute defence against phishing. This email has been signed with my private key. If you import my public key you can automatically decrypt my signature and be sure it came from me. Your email software can handle signing.
Hi Shaheed,
You're on the right track. lets deep dive in further.
The increasing iteration count in PBKDF2 for Django's password hasher is indeed related to the time it takes to run User.set_password(). Here's a breakdown of the situation and potential solutions:
Why the Increase?
Mitigating Execution Time:
While security is paramount, you might want to consider some options to manage execution time:
Important Considerations:
Alternatives (Use with Caution):
In Conclusion:
The increasing iteration count in Django's password hasher is a trade-off between security and performance. Evaluate your needs and available resources to determine the most suitable approach. Remember, prioritize security for sensitive data, and adjust settings or hardware cautiously to maintain a balance between speed and user experience.
Have a Nice Day Ahead. KEEP CODING