Page MenuHomePhabricator

Implement bcrypt hasher, transparent login upgrade, and explicit upgrade for passwords
ClosedPublic

Authored by epriestley on Feb 18 2014, 7:06 PM.
Tags
None
Referenced Files
F14100967: D8270.diff
Tue, Nov 26, 3:41 PM
Unknown Object (File)
Tue, Nov 5, 6:27 AM
Unknown Object (File)
Tue, Oct 29, 9:44 AM
Unknown Object (File)
Oct 27 2024, 5:53 AM
Unknown Object (File)
Oct 27 2024, 2:28 AM
Unknown Object (File)
Oct 23 2024, 5:15 AM
Unknown Object (File)
Oct 15 2024, 7:50 AM
Unknown Object (File)
Oct 4 2024, 6:57 PM
Subscribers

Details

Summary

Ref T4443.

  • Add a password_hash()-based bcrypt hasher if password_hash() is available.
  • When a user logs in using a password, upgrade their password to the strongest available hash format.
  • On the password settings page:
    • Warn the user if their password uses any algorithm other than the strongest one.
    • Show the algorithm the password uses.
    • Show the best available algorithm.
Test Plan

As an md5 user, viewed password settings page and saw a warning. Logged out. Logged in, got upgraded, no more warning. Changed password, verified database rehash. Logged out, logged in.

Diff Detail

Repository
rP Phabricator
Branch
hashalg3
Lint
Lint Passed
Unit
Tests Passed

Event Timeline

src/infrastructure/util/password/PhabricatorIteratedMD5PasswordHasher.php
15

The output of md5() has length 32, not 40.

src/infrastructure/util/password/PhabricatorPasswordHasher.php
111–130

bcrypt has salt embedded in the hash, so we need to be slightly more clever here.

261

Fixes a bug which is only relevant now that we have two hashers.

epriestley updated this revision to Unknown Object (????).Feb 18 2014, 7:10 PM
  • Fix an issue with comparing md5 signatures.
epriestley updated this revision to Unknown Object (????).Feb 18 2014, 7:13 PM
  • Fix some envelope open/close stuff.