Strengthen password hashing algorithm

This commit is contained in:
Tom Hughes 2013-08-13 23:07:41 +01:00
parent 2b88141cb3
commit 15d29c646b
4 changed files with 66 additions and 10 deletions

View file

@ -70,7 +70,7 @@ class User < ActiveRecord::Base
end end
end end
user = nil if user and user.pass_crypt != OSM::encrypt_password(options[:password], user.pass_salt) user = nil if user and not PasswordHash.check(user.pass_crypt, user.pass_salt, options[:password])
elsif options[:token] elsif options[:token]
token = UserToken.find_by_token(options[:token]) token = UserToken.find_by_token(options[:token])
user = token.user if token user = token.user if token
@ -240,8 +240,7 @@ private
def encrypt_password def encrypt_password
if pass_crypt_confirmation if pass_crypt_confirmation
self.pass_salt = OSM::make_token(8) self.pass_crypt, self.pass_salt = PasswordHash.create(pass_crypt)
self.pass_crypt = OSM::encrypt_password(pass_crypt, pass_salt)
self.pass_crypt_confirmation = nil self.pass_crypt_confirmation = nil
end end
end end

View file

@ -5,7 +5,6 @@ module OSM
require 'rexml/parsers/sax2parser' require 'rexml/parsers/sax2parser'
require 'rexml/text' require 'rexml/text'
require 'xml/libxml' require 'xml/libxml'
require 'digest/md5'
if defined?(SystemTimer) if defined?(SystemTimer)
Timer = SystemTimer Timer = SystemTimer
@ -569,12 +568,6 @@ module OSM
return token return token
end end
# Return an encrypted version of a password
def self.encrypt_password(password, salt)
return Digest::MD5.hexdigest(password) if salt.nil?
return Digest::MD5.hexdigest(salt + password)
end
# Return an SQL fragment to select a given area of the globe # Return an SQL fragment to select a given area of the globe
def self.sql_for_area(bbox, prefix = nil) def self.sql_for_area(bbox, prefix = nil)
tilesql = QuadTile.sql_for_area(bbox, prefix) tilesql = QuadTile.sql_for_area(bbox, prefix)

39
lib/password_hash.rb Normal file
View file

@ -0,0 +1,39 @@
require "securerandom"
require "openssl"
require "base64"
require "digest/md5"
module PasswordHash
SALT_BYTE_SIZE = 32
HASH_BYTE_SIZE = 32
PBKDF2_ITERATIONS = 1000
DIGEST_ALGORITHM = "sha512"
def self.create(password)
salt = SecureRandom.base64(SALT_BYTE_SIZE)
hash = self.hash(password, salt, PBKDF2_ITERATIONS, HASH_BYTE_SIZE, DIGEST_ALGORITHM)
return hash, [DIGEST_ALGORITHM, PBKDF2_ITERATIONS, salt].join("!")
end
def self.check(hash, salt, candidate)
if salt.nil?
candidate = Digest::MD5.hexdigest(candidate)
elsif salt =~ /!/
algorithm, iterations, salt = salt.split("!")
size = Base64.strict_decode64(hash).length
candidate = self.hash(candidate, salt, iterations.to_i, size, algorithm)
else
candidate = Digest::MD5.hexdigest(salt + candidate)
end
return hash == candidate
end
private
def self.hash(password, salt, iterations, size, algorithm)
digest = OpenSSL::Digest.new(algorithm)
pbkdf2 = OpenSSL::PKCS5::pbkdf2_hmac(password, salt, iterations, size, digest)
Base64.strict_encode64(pbkdf2)
end
end

View file

@ -0,0 +1,25 @@
require File.dirname(__FILE__) + '/../test_helper'
class PasswordHashTest < ActiveSupport::TestCase
def test_md5_without_salt
assert_equal true, PasswordHash.check("5f4dcc3b5aa765d61d8327deb882cf99", nil, "password")
assert_equal false, PasswordHash.check("5f4dcc3b5aa765d61d8327deb882cf99", nil, "wrong")
end
def test_md5_with_salt
assert_equal true, PasswordHash.check("67a1e09bb1f83f5007dc119c14d663aa", "salt", "password")
assert_equal false, PasswordHash.check("67a1e09bb1f83f5007dc119c14d663aa", "salt", "wrong")
assert_equal false, PasswordHash.check("67a1e09bb1f83f5007dc119c14d663aa", "wrong", "password")
end
def test_default
hash1, salt1 = PasswordHash.create("password")
hash2, salt2 = PasswordHash.create("password")
assert_not_equal hash1, hash2
assert_not_equal salt1, salt2
assert_equal true, PasswordHash.check(hash1, salt1, "password")
assert_equal false, PasswordHash.check(hash1, salt1, "wrong")
assert_equal true, PasswordHash.check(hash2, salt2, "password")
assert_equal false, PasswordHash.check(hash2, salt2, "wrong")
end
end