gpt4 book ai didi

php - time() 是一种好盐吗?

转载 作者:行者123 更新时间:2023-12-02 01:29:08 25 4
gpt4 key购买 nike

我正在查看一些我自己没有编写的代码。该代码尝试使用 SHA512 对密码进行哈希处理,并仅使用 time()作为盐。是 time()太简单的盐或者这个代码安全吗?

感谢您的回答和评论。我在这里为新读者总结一下:

  • 每个用户的盐应该是不同的,所以如果两个用户同时注册,他们的盐就不会是唯一的。这是一个问题,但不是大问题。
  • 但是盐不应该与用户有任何关系,所以 time() 不是一个好的盐。
  • “使用随机、均匀分布的高熵盐。” -- 这么多,那么什么代码可能会生成 random, evenly distributed, high entropy盐?

  • 好的,那么我用 32 个字符长的随机字符串替换 time() 怎么样。随机字符串可以通过在一组字母字符上循环 32 次来生成。听起来不错?

    最佳答案

    简短回答:

    不,time()不是好盐。

    长答案:

    复制自我对 Salt Generation and open source software 的回答

    What is a salt?

    A salt is a random set of bytes of a fixed length that is added to the input of a hash algorithm.


    Why is salting (or seeding) a hash useful?

    Adding a random salt to a hash ensures that the same password will produce many different hashes. The salt is usually stored in the database, together with the result of the hash function. Salting a hash is good for a number of reasons:

    1. Salting greatly increases the difficulty/cost of precomputated attacks (including rainbow tables)
    2. Salting makes sure that the same password does not result in the same hash. This makes sure you cannot determine if two users have the same password. And, even more important, you cannot determine if the same person uses the same password across different systems.
    3. Salting increases the complexity of passwords, thereby greatly decreasing the effectiveness of both Dictionary- and Birthday attacks. (This is only true if the salt is stored separate from the hash).
    4. Proper salting greatly increases the storage need for precomputation attacks, up to the point where they are no longer practical. (8 character case-sensitive alpha-numeric passwords with 16 bit salt, hashed to a 128 bit value, would take up just under 200 exabytes without rainbow reduction).


    There is no need for the salt to be secret.

    A salt is not a secret key, instead a salt 'works' by making the hash function specific to each instance. With salted hash, there is not one hash function, but one for every possible salt value. This prevent the attacker from attacking N hashed passwords for less than N times the cost of attacking one password. This is the point of the salt.
    A "secret salt" is not a salt, it is called a "key", and it means that you are no longer computing a hash, but a Message Authentication Code (MAC). Computing MAC is tricky business (much trickier than simply slapping together a key and a value into a hash function) and it is a very different subject altogether.

    The salt must be random for every instance in which it is used. This ensures that an attacker has to attack every salted hash separately.
    If you rely on your salt (or salting algorithm) being secret, you enter the realms of Security Through Obscurity (won't work). Most probably, you do not get additional security from the salt secrecy; you just get the warm fuzzy feeling of security. So instead of making your system more secure, it just distracts you from reality.


    So, why does the salt have to be random?

    Technically, the salt should be unique. The point of the salt is to be distinct for each hashed password. This is meant worldwide. Since there is no central organization which distributes unique salts on demand, we have to rely on the next best thing, which is random selection with an unpredictable random generator, preferably within a salt space large enough to make collisions improbable (two instances using the same salt value).

    It is tempting to try to derive a salt from some data which is "presumably unique", such as the user ID, but such schemes often fail due to some nasty details:

    1. If you use for example the user ID, some bad guys, attacking distinct systems, may just pool their resources and create precomputed tables for user IDs 1 to 50. A user ID is unique system-wide but not worldwide.

    2. The same applies to the username: there is one "root" per Unix system, but there are many roots in the world. A rainbow table for "root" would be worth the effort, since it could be applied to millions of systems. Worse yet, there are also many "bob" out there, and many do not have sysadmin training: their passwords could be quite weak.

    3. Uniqueness is also temporal. Sometimes, users change their password. For each new password, a new salt must be selected. Otherwise, an attacker obtained the hash of the old password and the hash of the new could try to attack both simultaneously.

    Using a random salt obtained from a cryptographically secure, unpredictable PRNG may be some kind of overkill, but at least it provably protects you against all those hazards. It's not about preventing the attacker from knowing what an individual salt is, it's about not giving them the big, fat target that will be used on a substantial number of potential targets. Random selection makes the targets as thin as is practical.


    In conclusion:

    Use a random, evenly distributed, high entropy salt. Use a new salt whenever you create a new password or change a password. Store the salt along with the hashed password. Favor big salts (at least 10 bytes, preferably 16 or more).

    A salt does not turn a bad password into a good password. It just makes sure that the attacker will at least pay the dictionary attack price for each bad password he breaks.


    Usefull sources:
    stackoverflow.com: Non-random salt for password hashes
    Bruce Schneier: Practical Cryptography (book)
    Matasano Security: Enough with the Rainbow Tables
    usenix.org: Unix crypt used salt since 1976
    owasp.org: Why add salt
    openwall.com: Salts

    Disclaimer:
    I'm not a security expert. (Although this answer was reviewed by Thomas Pornin)
    If any of the security professionals out there find something wrong, please do comment or edit this wiki answer.



    至于随机盐的好来源
    另请阅读: What is the most secure seed for random number generation?
    在没有专用的、基于硬件的随机生成器的情况下,获取随机数据的最佳方式是询问操作系统(在 Linux 上,这称为 /dev/random/dev/urandom [两者各有优缺点,选择你的毒药] ; 在 Windows 上,调用 CryptGenRandom() )

    如果由于某种原因您无法访问上述随机源,在 PHP 中您可以使用以下函数:
    出处 phpass v0.3
    <?php
    /**
    * Generate pseudo random bits
    * @copyright: public domain
    * @link http://www.openwall.com/phpass/
    * @param int $length number of bits to generate
    * @return string A string with the hexadecimal number
    * @note don't try to improve this, you will likely just ruin it
    */
    function random_bits($entropy) {
    $entropy /= 8;
    $state = uniqid();
    $str = '';
    for ($i = 0; $i < $entropy; $i += 16) {
    $state = md5(microtime().$state);
    $str .= md5($state, true);
    }
    $str = unpack('H*', substr($str, 0, $entropy));
    // for some weird reason, on some machines 32 bits binary data comes out as 65! hex characters!?
    // so, added the substr
    return substr(str_pad($str[1], $entropy*2, '0'), 0, $entropy*2);
    }
    ?>

    关于php - time() 是一种好盐吗?,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/4983915/

    25 4 0
    Copyright 2021 - 2024 cfsdn All Rights Reserved 蜀ICP备2022000587号
    广告合作:1813099741@qq.com 6ren.com