admin管理员组文章数量:1344530
I am using bcrypt to generate salts and hash passwords, but I do not think that it is doing it very securely. When I use the following code:
bcrypt.genSalt(10, function(err, salt) {
user.salt = salt;
bcrypt.hash(password, salt, function(err, hash) {
user.hashed_password = hash;
console.log(user.salt);
console.log(user.hashed_password);
user.save(function(err) {
if (err) console.log(err);
console.log("saved");
});
});
});
In one example, the salt is: $2a$10$mFFjRpY1Vrq7Fy1fFp0fMO
and the hashed_password is: $2a$10$mFFjRpY1Vrq7Fy1fFp0fMOVnlv9cKgAFdCQ5xdtlP6UoKz90i1FMu
The beginning of the hashed password is the exact same as the salt. If an attacker has access to the salt, can't he just remove the salt from the hashed_password and either brute force or use a table of predetermined hashed values to determine the password?
I always thought this should be the order of hashing a password:
hash(salt + password)
Not:
salt + hash(password)
I am using bcrypt to generate salts and hash passwords, but I do not think that it is doing it very securely. When I use the following code:
bcrypt.genSalt(10, function(err, salt) {
user.salt = salt;
bcrypt.hash(password, salt, function(err, hash) {
user.hashed_password = hash;
console.log(user.salt);
console.log(user.hashed_password);
user.save(function(err) {
if (err) console.log(err);
console.log("saved");
});
});
});
In one example, the salt is: $2a$10$mFFjRpY1Vrq7Fy1fFp0fMO
and the hashed_password is: $2a$10$mFFjRpY1Vrq7Fy1fFp0fMOVnlv9cKgAFdCQ5xdtlP6UoKz90i1FMu
The beginning of the hashed password is the exact same as the salt. If an attacker has access to the salt, can't he just remove the salt from the hashed_password and either brute force or use a table of predetermined hashed values to determine the password?
I always thought this should be the order of hashing a password:
hash(salt + password)
Not:
salt + hash(password)
Share
Improve this question
asked Jul 18, 2013 at 7:20
egidraegidra
9,09721 gold badges67 silver badges92 bronze badges
1 Answer
Reset to default 17The beginning of the hashed password is the salt because you need access to the salt in order to verify the password.
The data you see is neither hash (salt + password) nor salt + hash(password) -- it is of the form
salt + hash(salt + password)
If an attacker gains access to this data, then:
- They can of course (theoretically) brute force the password -- no technique can prevent this, but rate limiting renders the attack impractical. The hash function used in this instance is specifically designed to take a long time to run, indirectly rate limiting the attack.
- They cannot use a standard table of hashes to find out the password -- that's because the hashed value also contains the unique salt. Of course the salt is out there in the clear so a table can be calculated, but since the salt is also unique to each hashed password this is no better than a brute force attack.
本文标签: javascriptBcrypt not that secure at hashing passwordsStack Overflow
版权声明:本文标题:javascript - Bcrypt not that secure at hashing passwords? - Stack Overflow 内容由网友自发贡献,该文观点仅代表作者本人, 转载请联系作者并注明出处:http://www.betaflare.com/web/1743798216a2540823.html, 本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌抄袭侵权/违法违规的内容,一经查实,本站将立刻删除。
发表评论