diff options
author | Rafael Mendonça França <rafaelmfranca@gmail.com> | 2013-08-04 07:30:12 -0700 |
---|---|---|
committer | Rafael Mendonça França <rafaelmfranca@gmail.com> | 2013-08-04 07:30:12 -0700 |
commit | 7b5a452bc9bc714c6be4128284d60a9745f2d5a9 (patch) | |
tree | d0bbd252401a8562bf113323a1bf7c3fada3df82 /guides/source | |
parent | 4fc74d2902f7fd87c81009af0bd652ac08bdb718 (diff) | |
parent | 16bf1ba476ff8e850d2e54042a58b53d6c423ea6 (diff) | |
download | rails-7b5a452bc9bc714c6be4128284d60a9745f2d5a9.tar.gz rails-7b5a452bc9bc714c6be4128284d60a9745f2d5a9.tar.bz2 rails-7b5a452bc9bc714c6be4128284d60a9745f2d5a9.zip |
Merge pull request #11677 from jaggederest/master
update guide to reflect default HMAC SHA1 in MessageVerifier used in SignedCookieStore
Diffstat (limited to 'guides/source')
-rw-r--r-- | guides/source/security.md | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/guides/source/security.md b/guides/source/security.md index ad0546810d..e4db26c64e 100644 --- a/guides/source/security.md +++ b/guides/source/security.md @@ -93,7 +93,7 @@ Rails 2 introduced a new default session storage, CookieStore. CookieStore saves * The client can see everything you store in a session, because it is stored in clear-text (actually Base64-encoded, so not encrypted). So, of course, _you don't want to store any secrets here_. To prevent session hash tampering, a digest is calculated from the session with a server-side secret and inserted into the end of the cookie. -That means the security of this storage depends on this secret (and on the digest algorithm, which defaults to SHA512, which has not been compromised, yet). So _don't use a trivial secret, i.e. a word from a dictionary, or one which is shorter than 30 characters_. +That means the security of this storage depends on this secret (and on the digest algorithm, which defaults to SHA1, for compatibility). So _don't use a trivial secret, i.e. a word from a dictionary, or one which is shorter than 30 characters_. `config.secret_key_base` is used for specifying a key which allows sessions for the application to be verified against a known secure key to prevent tampering. Applications get `config.secret_key_base` initialized to a random key in `config/initializers/secret_token.rb`, e.g.: |