Skip to main content

Django implementation of the Honeywords Project

Project description

Django implementation of the Honeywords Project by Ari Juels and Ronald L. Rivest.

Generates a list of honeywords along with the actual user password on user registration. If the wrong compromised honeyword is used to login, the user account will be automatically deactivated.

Written for Django 2.2 on Python 3.6

Quick Start

  1. Install Django Honeywords:

    pip install django-honeywords
  2. Add honeywords to INSTALLED_APPS in

  3. Create Honeywords table:

    ./ makemigrations honeywords
    ./ migrate
  4. Add HONEYCHECKER_URI = http(s)://<url/ip>:<port> into

  5. Add honeywords.backends.HoneywordsBackend to the top of AUTHENTICATION_BACKENDS in (or add AUTHENTICATION_BACKENDS if missing):

  6. Download to the Honeychecker server.

  7. Edit the IP, PORT and DATABASE settings in

    ### Settings
    IP = ''
    PORT = 55555
    DATABASE = 'honeychecker_db.sqlite3'
  8. Run on the Honeychecker server:




Project details

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Files for django-honeywords, version 0.1.0b1
Filename, size File type Python version Upload date Hashes
Filename, size django-honeywords-0.1.0b1.tar.gz (15.7 kB) File type Source Python version None Upload date Hashes View

Supported by

AWS AWS Cloud computing Datadog Datadog Monitoring DigiCert DigiCert EV certificate Facebook / Instagram Facebook / Instagram PSF Sponsor Fastly Fastly CDN Google Google Object Storage and Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Salesforce Salesforce PSF Sponsor Sentry Sentry Error logging StatusPage StatusPage Status page