mirror of
				https://codeberg.org/forgejo/forgejo.git
				synced 2025-10-28 13:01:04 +00:00 
			
		
		
		
	Increase Salt randomness (#18179)
- The current implementation of `RandomString` doesn't give you a most-possible unique randomness. It gives you 6*`length` instead of the possible 8*`length` bits(or as `length`x bytes) randomness. This is because `RandomString` is being limited to a max value of 63, this in order to represent the random byte as a letter/digit.
- The recommendation of pbkdf2 is to use 64+ bit salt, which the `RandomString` doesn't give with a length of 10, instead of increasing 10 to a higher number, this patch adds a new function called `RandomBytes` which does give you the guarentee of 8*`length` randomness and thus corresponding of `length`x bytes randomness.
- Use hexadecimal to store the bytes value in the database, as mentioned, it doesn't play nice in order to convert it to a string. This will always be a length of 32(with `length` being 16).
- When we detect on `Authenticate`(source: db) that a user has the old format of salt, re-hash the password such that the user will have it's password hashed with increased salt.
Thanks to @zeripath for working out the rouge edges from my first commit 😄.
Co-authored-by: lafriks <lauris@nix.lv>
Co-authored-by: zeripath <art27@cantab.net>
	
	
This commit is contained in:
		
					parent
					
						
							
								165346c15c
							
						
					
				
			
			
				commit
				
					
						623c93ff46
					
				
			
		
					 6 changed files with 115 additions and 14 deletions
				
			
		|  | @ -21,7 +21,9 @@ func Authenticate(user *user_model.User, login, password string) (*user_model.Us | |||
| 	} | ||||
| 
 | ||||
| 	// Update password hash if server password hash algorithm have changed | ||||
| 	if user.PasswdHashAlgo != setting.PasswordHashAlgo { | ||||
| 	// Or update the password when the salt length doesn't match the current | ||||
| 	// recommended salt length, this in order to migrate user's salts to a more secure salt. | ||||
| 	if user.PasswdHashAlgo != setting.PasswordHashAlgo || len(user.Salt) != user_model.SaltByteLength*2 { | ||||
| 		if err := user.SetPassword(password); err != nil { | ||||
| 			return nil, err | ||||
| 		} | ||||
|  |  | |||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue