TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: Is a 10Gb Docker image with the haveibeenpwned db on it a bad idea?

2 pointsby fuhrysteveabout 6 years ago
We have a site with sensitive data on it, and need to verify that when users create a new password that the password has not been previously exposed in a known breach. The way everyone seems to be doing this is by downloading and searching the 10gb haveibeenpwned database for sha1 matches of the candidate password.<p>We know that it&#x27;s best practice to keep docker images small, however this seems like a tempting solution for an annoying problem: simply make a 10Gb Docker image that downloads the haveibeenpwned database (which is ~10Gb) as part of the image, and expose a searchable API. Sure it would be slow to deploy an image that large on Kubernetes, but it seems like it&#x27;d otherwise be easy to maintain.<p>How are you checking passwords against haveibeenpwned &#x2F; similar for your users?

2 comments

LinuxBenderabout 6 years ago
This makes sense to me. We did something similar, just not in docker, but docker is just packaging&#x2F;deployment.
reimertzabout 6 years ago
Hi there,<p>Is there a reason why you don&#x27;t integrate with their API instead? Seems like they offer have what you need: <a href="https:&#x2F;&#x2F;haveibeenpwned.com&#x2F;API&#x2F;v2" rel="nofollow">https:&#x2F;&#x2F;haveibeenpwned.com&#x2F;API&#x2F;v2</a>
评论 #19501782 未加载