Ranter
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Comments
-
@nothappy it sounds like password_verify is not the solution. How else are you supposed to verify the password? You need to set up an SSL.
-
C0D4669446ySo... the code isn’t unsafe.
strap an SSL cert on top of the server and fix your problem.
If your running Apache/Nginx get your self “CertBot” and the problem will go away quickly. -
C0D4669446y@nothappy how? If that’s the PHP7 password verifier then what’s wrong with it?
If it’s your own incarnation of it, then there’s probably a problem. -
@CodeMonkeyG yes obviously password_verify() isn't solution, I really don't want any major code change cos then I'll have to rewrite the whole thing in website
-
C0D4669446y@nothappy
If you’re using this function in PHP
http://php.net/manual/en/...
How do you see it as hacky code?
Your problem - from what you have described is you don’t run an SSL cert on your server containing the login api. Which is quickly fixed by adding a cert. -
Its simple, store the password in database with something likr a salted sha512 hash, then when a user attempts to login, ypu transfer his plain text password (over tls/ssl) and hash that with the samr salted sha512 and then compare the hashes, if they match... bingo
-
@InterferenceObj but that's the thing with sha it never generates same hash for same text,
-
C0D4669446y@nothappy then how do you suppose you are going to confirm that the plaintext version is correct against a hashed password?
Unless you use AES or something to literally encrypt the password but you will still end up doing a comparison either way.
I think I need a better idea on how you find this a hacky solution.
Or are you concerned with the plaintext being shipped to the API in the first place - even if you had SSL?
- don’t get me wrong, I’m just trying to understand what you actually mean so I can offer some reasonable advise. -
Root797346yThe best solution doesn't rely on third-party solutions like SSL to obscure the cleartext password.
Instead: One-way-hash the password on the client. Salt and re-hash on the server, then compare. This way only the client ever sees the cleartext password, so even a MITM attack will not work. SSL on top of this of course further complicates attempted attacks. Database leaks are also less helpful to attackers, since the password hashes it contains are double-hashed with salt. (This doesn't increase the difficulty of logging into your service (db leak -> bruteforce hashes -> obtain hashed password -> login), but does exponentially increase the difficulty of recovering the cleartext password, thus protecting the user from their transgression of password reuse.)
The only clientside attack surface (minus keyloggers/etc.) here is recording all client traffic, breaking the SSL if present, then brute-forcing the intercepted hashes with the known clientside hashing algorithm -- very expensive. -
Why exactly do you think do browsers warn when logging in over unencrypted connections?
-
@Root if you always hash the password on the client before transmitting, then effectively, that hash IS the password.
-
Root797346y@Fast-Nop Correct. but it obscures the password, protecting the user from password reuse.
-
@Root but with that, we are back to square one - unencrypted effective password over an unencrypted connection which makes MITM possible. Security by obscurity is a dangerous road.
Even with a challenge-response architecture like in the good old CHAP, the problem would remain how to initially share the secret. -
@C0D4 Store it in plain text of course. It should be sent over SSL but stored and verified in plain text. Haven't you read the latest articles?
-
C0D4669446y@CodeMonkeyG haha ๐
I’m glad I know your not being serious right now ๐ or are you? ๐คจ
@Root’s approach would work too with doing a hash at app side then shipping it to API with a rehash and stored salt (hash), granted its obscurity, but the original “plain text” password is never exposed. -
@C0D4 if there is a MITM problem, the fact that the transmitted hash would be the same at the second time would reveal that it's effectively the password.
-
sSam14836y@Root @Fast-Nop
You can do it a little better:
1. server generates random bits (rb) and sends it to client along with salt.
2. client sends to server: hash( hash(psw+salt) + rb )
3. server: hash(storedPsw + rb) == receivedPswFromClient
Sure MITM can still bruteforce password, but that might take long time and without bruteforce it prevents reusing hash to login and hides the plaintext password. -
sSam14836yMy previous comment was just a comment to an ongoing discussion, and not a solution to OP's problem.
I'm not a PHP dev, but I doubt that the function is the problem, the problem is that you are not using TLS for the connection , as stated before. -
@sSam I know, that's about what CHAP does that I referred to above. The problem is: how does the server initially even get the hash of PW+Salt when the connection isn't encrypted?
Related Rants
So, I made this API which logins to the system and Used it in an android app, there was one roadblock to it, that everytime user enters a password, it has to match the password hash so I, excitingly, used password_verify($password,$passwordHash), unknowingly that it is fucking unsafe and the code is still there, and here's where it gets interesting it is not over SSL/TLS. Fuck me, any bright solutions?
rant
php
android
api