Skip to content

Conversation

@fdie
Copy link

@fdie fdie commented Feb 23, 2024

The recommended iteration count has been increased to 10000 for SASL-SCRAM-SHA512 as stated here

@fdie fdie changed the title Increase the iteration count for SCRAM-SHA-512 to 10000 Increase the iteration count for SCRAM-SHA512 to 10000 Feb 23, 2024
@Neustradamus
Copy link

@fdie: Yep!

@tmolitor-stud-tu
Copy link
Contributor

The same rationale is true for SCRAM-SHA-1 and SCRAM-SHA-256, too. You should increase these as well. Also 10000 is the absolute minimum and still really low. You should consider increasing it to 32768 or add a config setting to allow users to configure a higher iteration count.

@fdie
Copy link
Author

fdie commented Jan 9, 2026

I agree, the RFCs minimal iteration counts are hard coded but they should be configurable.
And scram-sha1 should be disabled...

@weiss
Copy link
Member

weiss commented Jan 9, 2026

they should be configurable.

If we can figure out a value that presumably (a) is secure enough for everyone for the foreseeable future without (b) resulting in multi-second delays during login when using common client hardware, I think there'd be value in sticking to hard-coding it.

Obscure configuration settings blow up the documentation, increase the amount of (untested) code paths, and carry the risk that admins who don't know what they're doing will do something bad (unintentionally). In my book, this should only be a configuration setting if the desirable value actually does depend on the environment.

And scram-sha1 should be disabled...

That's configurable already.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants