X-Git-Url: http://wagnertech.de/git?a=blobdiff_plain;f=SL%2FAuth%2FPassword.pm;h=20a9ed57c4bae3e0ad84fab23f12867b33988c82;hb=47db6ae13df64092d401896ec476b9335e9ec807;hp=4141bba4df226c5f6eaadf0ca36a3429092785cc;hpb=e0c3dcb8647d811bf327ad3f50175acb3289a986;p=kivitendo-erp.git diff --git a/SL/Auth/Password.pm b/SL/Auth/Password.pm index 4141bba4d..20a9ed57c 100644 --- a/SL/Auth/Password.pm +++ b/SL/Auth/Password.pm @@ -3,49 +3,53 @@ package SL::Auth::Password; use strict; use Carp; +use Digest::SHA (); +use Encode (); +use PBKDF2::Tiny (); -sub hash { +sub hash_pkkdf2 { my ($class, %params) = @_; - if (!$params{algorithm}) { - $params{algorithm} = 'SHA256S'; - $params{fallback_algorithm} = 'MD5'; - } + # PBKDF2::Tiny expects data to be in octets. Therefore we must + # encode everything we hand over (login, password) to UTF-8. + # This hash method uses a random hash and not just the user's login + # for its salt. This is due to the official recommendation that at + # least eight octets of random data should be used. Therefore we + # must store the salt together with the hashed password. The format + # in the database is: - my $salt = $params{algorithm} =~ m/S$/ ? $params{login} : ''; + # {PBKDF2}salt-in-hex:hash-in-hex - if ($params{algorithm} =~ m/^SHA256/) { - if (eval { require Digest::SHA; 1 }) { - return '{' . $params{algorithm} . '}' . Digest::SHA::sha256_hex($salt . $params{password}); + my $salt; - } elsif ($params{fallback_algorithm}) { - return $class->hash_password(%params, algorithm => $params{fallback_algorithm}); + if ((defined $params{stored_password}) && ($params{stored_password} =~ m/^\{PBKDF2\} ([0-9a-f]+) :/x)) { + $salt = (split m{:}, Encode::encode('utf-8', $1), 2)[0]; - } else { - die 'Digest::SHA is not available'; - } + } else { + my @login = map { ord } split m{}, Encode::encode('utf-8', $params{login}); + my @random = map { int(rand(256)) } (0..16); - } elsif ($params{algorithm} =~ m/^SHA1/) { - if (eval { require Digest::SHA; 1 }) { - return '{' . $params{algorithm} . '}' . Digest::SHA::sha1_hex($salt . $params{password}); + $salt = join '', map { sprintf '%02x', $_ } @login, @random; + } - } elsif (eval { require Digest::SHA1; 1 }) { - return '{' . $params{algorithm} . '}' . Digest::SHA1::sha1_hex($salt . $params{password}); + my $hashed = "{PBKDF2}${salt}:" . join('', map { sprintf '%02x', ord } split m{}, PBKDF2::Tiny::derive('SHA-256', $salt, Encode::encode('utf-8', $params{password}))); - } elsif ($params{fallback_algorithm}) { - return $class->hash_password(%params, algorithm => $params{fallback_algorithm}); + return $hashed; +} - } else { - die 'Neither Digest::SHA nor Digest::SHA1 is available'; - } +sub hash { + my ($class, %params) = @_; + + $params{algorithm} ||= 'PBKDF2'; - } elsif ($params{algorithm} =~ m/^MD5/) { - require Digest::MD5; - return '{' . $params{algorithm} . '}' . Digest::MD5::md5_hex($salt . $params{password}); + my $salt = $params{algorithm} =~ m/S$/ ? $params{login} : ''; + + if ($params{algorithm} =~ m/^SHA256/) { + return '{' . $params{algorithm} . '}' . Digest::SHA::sha256_hex($salt . $params{password}); - } elsif ($params{algorithm} eq 'CRYPT') { - return '{CRYPT}' . crypt($params{password}, substr($params{login}, 0, 2)); + } elsif ($params{algorithm} =~ m/^PBKDF2/) { + return $class->hash_pkkdf2(password => $params{password}, stored_password => $params{stored_password}); } else { croak 'Unsupported hash algorithm ' . $params{algorithm}; @@ -72,7 +76,7 @@ sub parse { my ($class, $password, $default_algorithm) = @_; return ($1, $2) if $password =~ m/^\{ ([^\}]+) \} (.+)/x; - return ($default_algorithm || 'CRYPT', $password); + return ($default_algorithm || 'PBKDF2', $password); } 1;