mirror of
https://github.com/spring-projects/spring-security.git
synced 2025-07-23 10:43:30 +00:00
Add LdapShaPasswordEncoder to crypto
Issue: gh-4674
This commit is contained in:
parent
d9a594d039
commit
1ed1716df4
@ -0,0 +1,201 @@
|
|||||||
|
/*
|
||||||
|
* Copyright 2002-2017 the original author or authors.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.springframework.security.crypto.password;
|
||||||
|
|
||||||
|
import org.springframework.security.crypto.codec.Utf8;
|
||||||
|
import org.springframework.security.crypto.keygen.BytesKeyGenerator;
|
||||||
|
import org.springframework.security.crypto.keygen.KeyGenerators;
|
||||||
|
|
||||||
|
import java.security.MessageDigest;
|
||||||
|
import java.util.Base64;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* This {@link PasswordEncoder} is provided for legacy purposes only and is not considered
|
||||||
|
* secure.
|
||||||
|
*
|
||||||
|
* A version of {@link PasswordEncoder} which supports Ldap SHA and SSHA (salted-SHA)
|
||||||
|
* encodings. The values are base-64 encoded and have the label "{SHA}" (or "{SSHA}")
|
||||||
|
* prepended to the encoded hash. These can be made lower-case in the encoded password, if
|
||||||
|
* required, by setting the <tt>forceLowerCasePrefix</tt> property to true.
|
||||||
|
*
|
||||||
|
* Also supports plain text passwords, so can safely be used in cases when both encoded
|
||||||
|
* and non-encoded passwords are in use or when a null implementation is required.
|
||||||
|
*
|
||||||
|
* @author Luke Taylor
|
||||||
|
* @deprecated Digest based password encoding is not considered secure. Instead use an
|
||||||
|
* adaptive one way funciton like BCryptPasswordEncoder, Pbkdf2PasswordEncoder, or
|
||||||
|
* SCryptPasswordEncoder. Even better use {@link DelegatingPasswordEncoder} which supports
|
||||||
|
* password upgrades.
|
||||||
|
*/
|
||||||
|
@Deprecated
|
||||||
|
public class LdapShaPasswordEncoder implements PasswordEncoder {
|
||||||
|
// ~ Static fields/initializers
|
||||||
|
// =====================================================================================
|
||||||
|
|
||||||
|
/** The number of bytes in a SHA hash */
|
||||||
|
private static final int SHA_LENGTH = 20;
|
||||||
|
private static final String SSHA_PREFIX = "{SSHA}";
|
||||||
|
private static final String SSHA_PREFIX_LC = SSHA_PREFIX.toLowerCase();
|
||||||
|
private static final String SHA_PREFIX = "{SHA}";
|
||||||
|
private static final String SHA_PREFIX_LC = SHA_PREFIX.toLowerCase();
|
||||||
|
|
||||||
|
// ~ Instance fields
|
||||||
|
// ================================================================================================
|
||||||
|
private BytesKeyGenerator saltGenerator = KeyGenerators.secureRandom();
|
||||||
|
|
||||||
|
private boolean forceLowerCasePrefix;
|
||||||
|
|
||||||
|
// ~ Constructors
|
||||||
|
// ===================================================================================================
|
||||||
|
|
||||||
|
public LdapShaPasswordEncoder() {
|
||||||
|
}
|
||||||
|
|
||||||
|
// ~ Methods
|
||||||
|
// ========================================================================================================
|
||||||
|
|
||||||
|
private byte[] combineHashAndSalt(byte[] hash, byte[] salt) {
|
||||||
|
if (salt == null) {
|
||||||
|
return hash;
|
||||||
|
}
|
||||||
|
|
||||||
|
byte[] hashAndSalt = new byte[hash.length + salt.length];
|
||||||
|
System.arraycopy(hash, 0, hashAndSalt, 0, hash.length);
|
||||||
|
System.arraycopy(salt, 0, hashAndSalt, hash.length, salt.length);
|
||||||
|
|
||||||
|
return hashAndSalt;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Calculates the hash of password (and salt bytes, if supplied) and returns a base64
|
||||||
|
* encoded concatenation of the hash and salt, prefixed with {SHA} (or {SSHA} if salt
|
||||||
|
* was used).
|
||||||
|
*
|
||||||
|
* @param rawPass the password to be encoded.
|
||||||
|
*
|
||||||
|
* @return the encoded password in the specified format
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
public String encode(CharSequence rawPass) {
|
||||||
|
byte[] salt = this.saltGenerator.generateKey();
|
||||||
|
return encode(rawPass, salt);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
private String encode(CharSequence rawPassword, byte[] salt) {
|
||||||
|
MessageDigest sha;
|
||||||
|
|
||||||
|
try {
|
||||||
|
sha = MessageDigest.getInstance("SHA");
|
||||||
|
sha.update(Utf8.encode(rawPassword));
|
||||||
|
}
|
||||||
|
catch (java.security.NoSuchAlgorithmException e) {
|
||||||
|
throw new IllegalStateException("No SHA implementation available!");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (salt != null) {
|
||||||
|
sha.update(salt);
|
||||||
|
}
|
||||||
|
|
||||||
|
byte[] hash = combineHashAndSalt(sha.digest(), (byte[]) salt);
|
||||||
|
|
||||||
|
String prefix;
|
||||||
|
|
||||||
|
if (salt == null || salt.length == 0) {
|
||||||
|
prefix = forceLowerCasePrefix ? SHA_PREFIX_LC : SHA_PREFIX;
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
prefix = forceLowerCasePrefix ? SSHA_PREFIX_LC : SSHA_PREFIX;
|
||||||
|
}
|
||||||
|
|
||||||
|
return prefix + Utf8.decode(Base64.getEncoder().encode(hash));
|
||||||
|
}
|
||||||
|
|
||||||
|
private byte[] extractSalt(String encPass) {
|
||||||
|
String encPassNoLabel = encPass.substring(6);
|
||||||
|
|
||||||
|
byte[] hashAndSalt = Base64.getDecoder().decode(encPassNoLabel.getBytes());
|
||||||
|
int saltLength = hashAndSalt.length - SHA_LENGTH;
|
||||||
|
byte[] salt = new byte[saltLength];
|
||||||
|
System.arraycopy(hashAndSalt, SHA_LENGTH, salt, 0, saltLength);
|
||||||
|
|
||||||
|
return salt;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Checks the validity of an unencoded password against an encoded one in the form
|
||||||
|
* "{SSHA}sQuQF8vj8Eg2Y1hPdh3bkQhCKQBgjhQI".
|
||||||
|
*
|
||||||
|
* @param rawPassword unencoded password to be verified.
|
||||||
|
* @param encodedPassword the actual SSHA or SHA encoded password
|
||||||
|
*
|
||||||
|
* @return true if they match (independent of the case of the prefix).
|
||||||
|
*/
|
||||||
|
public boolean matches(CharSequence rawPassword, String encodedPassword) {
|
||||||
|
return matches(rawPassword == null ? null : rawPassword.toString(), encodedPassword);
|
||||||
|
}
|
||||||
|
|
||||||
|
private boolean matches(String rawPassword, String encodedPassword) {
|
||||||
|
String prefix = extractPrefix(encodedPassword);
|
||||||
|
|
||||||
|
if (prefix == null) {
|
||||||
|
return PasswordEncoderUtils.equals(encodedPassword, rawPassword);
|
||||||
|
}
|
||||||
|
|
||||||
|
byte[] salt;
|
||||||
|
if (prefix.equals(SSHA_PREFIX) || prefix.equals(SSHA_PREFIX_LC)) {
|
||||||
|
salt = extractSalt(encodedPassword);
|
||||||
|
}
|
||||||
|
else if (!prefix.equals(SHA_PREFIX) && !prefix.equals(SHA_PREFIX_LC)) {
|
||||||
|
throw new IllegalArgumentException("Unsupported password prefix '" + prefix
|
||||||
|
+ "'");
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
// Standard SHA
|
||||||
|
salt = null;
|
||||||
|
}
|
||||||
|
|
||||||
|
int startOfHash = prefix.length();
|
||||||
|
|
||||||
|
String encodedRawPass = encode(rawPassword, salt).substring(startOfHash);
|
||||||
|
|
||||||
|
return PasswordEncoderUtils
|
||||||
|
.equals(encodedRawPass, encodedPassword.substring(startOfHash));
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the hash prefix or null if there isn't one.
|
||||||
|
*/
|
||||||
|
private String extractPrefix(String encPass) {
|
||||||
|
if (!encPass.startsWith("{")) {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
int secondBrace = encPass.lastIndexOf('}');
|
||||||
|
|
||||||
|
if (secondBrace < 0) {
|
||||||
|
throw new IllegalArgumentException(
|
||||||
|
"Couldn't find closing brace for SHA prefix");
|
||||||
|
}
|
||||||
|
|
||||||
|
return encPass.substring(0, secondBrace + 1);
|
||||||
|
}
|
||||||
|
|
||||||
|
public void setForceLowerCasePrefix(boolean forceLowerCasePrefix) {
|
||||||
|
this.forceLowerCasePrefix = forceLowerCasePrefix;
|
||||||
|
}
|
||||||
|
}
|
@ -0,0 +1,113 @@
|
|||||||
|
/*
|
||||||
|
* Copyright 2002-2017 the original author or authors.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.springframework.security.crypto.password;
|
||||||
|
|
||||||
|
import org.assertj.core.api.AbstractBooleanAssert;
|
||||||
|
import org.junit.Before;
|
||||||
|
import org.junit.Test;
|
||||||
|
import org.springframework.security.crypto.keygen.KeyGenerators;
|
||||||
|
|
||||||
|
import static org.assertj.core.api.Assertions.assertThat;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Tests {@link LdapShaPasswordEncoder}.
|
||||||
|
*
|
||||||
|
* @author Luke Taylor
|
||||||
|
*/
|
||||||
|
public class LdapShaPasswordEncoderTests {
|
||||||
|
// ~ Instance fields
|
||||||
|
// ================================================================================================
|
||||||
|
|
||||||
|
LdapShaPasswordEncoder sha = new LdapShaPasswordEncoder();
|
||||||
|
|
||||||
|
// ~ Methods
|
||||||
|
// ========================================================================================================
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void invalidPasswordFails() {
|
||||||
|
assertThat(this.sha.matches("wrongpassword", "{SHA}ddSFGmjXYPbZC+NXR2kCzBRjqiE=")).isFalse();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void invalidSaltedPasswordFails() {
|
||||||
|
assertThat(this.sha.matches("wrongpassword", "{SSHA}25ro4PKC8jhQZ26jVsozhX/xaP0suHgX")).isFalse();
|
||||||
|
assertThat(this.sha.matches("wrongpassword", "{SSHA}PQy2j+6n5ytA+YlAKkM8Fh4p6u2JxfVd")).isFalse();
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Test values generated by 'slappasswd -h {SHA} -s boabspasswurd'
|
||||||
|
*/
|
||||||
|
@Test
|
||||||
|
public void validPasswordSucceeds() {
|
||||||
|
this.sha.setForceLowerCasePrefix(false);
|
||||||
|
assertThat(this.sha.matches("boabspasswurd", "{SHA}ddSFGmjXYPbZC+NXR2kCzBRjqiE=")).isTrue();
|
||||||
|
assertThat(this.sha.matches("boabspasswurd", "{sha}ddSFGmjXYPbZC+NXR2kCzBRjqiE=")).isTrue();
|
||||||
|
this.sha.setForceLowerCasePrefix(true);
|
||||||
|
assertThat(this.sha.matches("boabspasswurd", "{SHA}ddSFGmjXYPbZC+NXR2kCzBRjqiE=")).isTrue();
|
||||||
|
assertThat(this.sha.matches("boabspasswurd", "{sha}ddSFGmjXYPbZC+NXR2kCzBRjqiE=")).isTrue();
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Test values generated by 'slappasswd -s boabspasswurd'
|
||||||
|
*/
|
||||||
|
@Test
|
||||||
|
public void validSaltedPasswordSucceeds() {
|
||||||
|
this.sha.setForceLowerCasePrefix(false);
|
||||||
|
assertThat(this.sha.matches("boabspasswurd", "{SSHA}25ro4PKC8jhQZ26jVsozhX/xaP0suHgX")).isTrue();
|
||||||
|
assertThat(this.sha.matches("boabspasswurd", "{ssha}PQy2j+6n5ytA+YlAKkM8Fh4p6u2JxfVd")).isTrue();
|
||||||
|
this.sha.setForceLowerCasePrefix(true);
|
||||||
|
assertThat(this.sha.matches("boabspasswurd", "{SSHA}25ro4PKC8jhQZ26jVsozhX/xaP0suHgX")).isTrue();
|
||||||
|
assertThat(this.sha.matches("boabspasswurd", "{ssha}PQy2j+6n5ytA+YlAKkM8Fh4p6u2JxfVd")).isTrue();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
// SEC-1031
|
||||||
|
public void fullLengthOfHashIsUsedInComparison() throws Exception {
|
||||||
|
assertThat(this.sha.matches("boabspasswurd", "{SSHA}25ro4PKC8jhQZ26jVsozhX/xaP0suHgX")).isTrue();
|
||||||
|
// Change the first hash character from '2' to '3'
|
||||||
|
assertThat(this.sha.matches("boabspasswurd", "{SSHA}35ro4PKC8jhQZ26jVsozhX/xaP0suHgX")).isFalse();
|
||||||
|
// Change the last hash character from 'X' to 'Y'
|
||||||
|
assertThat(this.sha.matches("boabspasswurd", "{SSHA}25ro4PKC8jhQZ26jVsozhX/xaP0suHgY")).isFalse();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void correctPrefixCaseIsUsed() {
|
||||||
|
this.sha.setForceLowerCasePrefix(false);
|
||||||
|
assertThat(this.sha.encode("somepassword").startsWith("{SSHA}"));
|
||||||
|
|
||||||
|
this.sha.setForceLowerCasePrefix(true);
|
||||||
|
assertThat(this.sha.encode("somepassword").startsWith("{ssha}"));
|
||||||
|
|
||||||
|
this.sha = new LdapShaPasswordEncoder(KeyGenerators.shared(0));
|
||||||
|
this.sha.setForceLowerCasePrefix(false);
|
||||||
|
assertThat(this.sha.encode("somepassword").startsWith("{SHA}"));
|
||||||
|
|
||||||
|
this.sha.setForceLowerCasePrefix(true);
|
||||||
|
assertThat(this.sha.encode("somepassword").startsWith("{SSHA}"));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(expected = IllegalArgumentException.class)
|
||||||
|
public void invalidPrefixIsRejected() {
|
||||||
|
this.sha.matches("somepassword","{MD9}xxxxxxxxxx");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(expected = IllegalArgumentException.class)
|
||||||
|
public void malformedPrefixIsRejected() {
|
||||||
|
// No right brace
|
||||||
|
this.sha.matches("somepassword", "{SSHA25ro4PKC8jhQZ26jVsozhX/xaP0suHgX");
|
||||||
|
}
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user