aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorRafael Mendonça França <rafaelmfranca@gmail.com>2013-08-04 07:30:12 -0700
committerRafael Mendonça França <rafaelmfranca@gmail.com>2013-08-04 07:30:12 -0700
commit7b5a452bc9bc714c6be4128284d60a9745f2d5a9 (patch)
treed0bbd252401a8562bf113323a1bf7c3fada3df82
parent4fc74d2902f7fd87c81009af0bd652ac08bdb718 (diff)
parent16bf1ba476ff8e850d2e54042a58b53d6c423ea6 (diff)
downloadrails-7b5a452bc9bc714c6be4128284d60a9745f2d5a9.tar.gz
rails-7b5a452bc9bc714c6be4128284d60a9745f2d5a9.tar.bz2
rails-7b5a452bc9bc714c6be4128284d60a9745f2d5a9.zip
Merge pull request #11677 from jaggederest/master
update guide to reflect default HMAC SHA1 in MessageVerifier used in SignedCookieStore
-rw-r--r--guides/source/security.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/guides/source/security.md b/guides/source/security.md
index ad0546810d..e4db26c64e 100644
--- a/guides/source/security.md
+++ b/guides/source/security.md
@@ -93,7 +93,7 @@ Rails 2 introduced a new default session storage, CookieStore. CookieStore saves
* The client can see everything you store in a session, because it is stored in clear-text (actually Base64-encoded, so not encrypted). So, of course, _you don't want to store any secrets here_. To prevent session hash tampering, a digest is calculated from the session with a server-side secret and inserted into the end of the cookie.
-That means the security of this storage depends on this secret (and on the digest algorithm, which defaults to SHA512, which has not been compromised, yet). So _don't use a trivial secret, i.e. a word from a dictionary, or one which is shorter than 30 characters_.
+That means the security of this storage depends on this secret (and on the digest algorithm, which defaults to SHA1, for compatibility). So _don't use a trivial secret, i.e. a word from a dictionary, or one which is shorter than 30 characters_.
`config.secret_key_base` is used for specifying a key which allows sessions for the application to be verified against a known secure key to prevent tampering. Applications get `config.secret_key_base` initialized to a random key in `config/initializers/secret_token.rb`, e.g.: