-
Notifications
You must be signed in to change notification settings - Fork 30.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Password Hashing API #21766
Comments
(Continuing on from the previous thread.) @ChALkeR While I understand that strictly speaking it cannot be removed due to stability concerns, this was merged less than a month ago, and the security impact of this issue is significant. It is very unlikely that the feature has seen any real-world adoption yet, especially considering that there have been userland options available for a long time, and the addition of this feature to core has not been widely publicized. Taking into account these data points, I think removing the API is justifiable even under the stability constraints of Node.js core. Documentation warnings, while better than nothing, are a substandard option; these warnings are often ignored, and they rarely get included in third-party documentation about a feature (eg. tutorials, screencasts, and so on). They are not likely to be an effective deterrent. All things considered, removal-for-the-time-being of the feature seems the most reasonable course of action here. |
cc @nodejs/crypto |
@joepie91 Do you think those concerns could be resolved with non-breaking changes? E.g.: warnings in docs, making |
I don't see a reasonable way in which this could be fixed in a non-breaking manner, personally; documentation warnings 'rot away' in the copy-pasting mill of tutorials and such, and an optional But most critically: the current return format is totally incompatible with a safe verification API. For a safe verification API to work as suggested, all the options and the salt need to be encoded into the output of the hashing function (such that the verification function can reproduce the hash), but as far as I can tell it only returns a 'raw' derivedKey right now. Changing the return format would be a breaking change either way. As an aside regarding the option of removing the unsafe API: 10.x is not yet in LTS, so the constraints on what can be changed API-wise are a little less strict, if I understand correctly. Also, perhaps it's a good idea to ping the Security WG on this as well? |
/cc @nodejs/security-wg |
I completely understand the issue, and the usability of the new API has already been criticized in the PR. However, this API was not designed to provide a comfortable way to hash passwords but to provide a full-featured scrypt implementation. If a crypto API claims to implement scrypt, I expect to be able to specify the salt and additional parameters and to get the raw, unfiltered hash out of it. We can probably add a new API that is designed for easy-to-use password hashing similar to what PHP does, but it has downsides. For example, PHP includes metadata in the output, something you probably would not expect, and which can easily break interoperability with other libraries. Many of these arguments apply to other crypto APIs: Users have to set certain parameters, derive IVs for cipher objects, pick cipher algorithms etc., and I still wouldn't want to remove all those features and just use defaults everywhere. If you look at the crypto commit log, you will see that we are doing a lot to prevent people from improperly using these APIs, but there are no guarantees. Again, we could add "simpler" APIs for each and every little crypto task ( Summary: I am not opposed to a new API that is designed for easy-to-use password-hashing, but having a full-featured scrypt API is justified. |
Specifically, they use a
I've started on an implementation of a password-hashing wrapper to submit in a pull request (which will use scrypt by default). I hope to have a first draft ready to be reviewed this evening. |
@ChALkeR I am removing the |
Correct, but with a caveat worth noting: cryptography API design is very important to application security in a lot of ways that aren't always immediately obvious. Node.js cryptography API security is, therefore, emphatically a security issue that affects Node.js. Whether or not that fact is sufficient to qualify for the As long as we're all clear on that note, let's carry on. |
I couldn't agree more with @joepie91 and @paragonie-scott. "Experts" can always write their native add-on and use the underlying crypto spaceship that is OpenSSL (to quote Matthew Green), they can also get at low-level implementations indirectly (e.g., we can define something like crypto-subtle) but the front-and-center APIs should address the 99% use case and make it impossible to misuse. Adding red tape warnings to the docs is a good start and maybe best be can do without breaking compat (unless there are usage metrics that say it's not really used), but we should really try to set up a process for crypto and security APIs to avoid repeating OpenSSL/WebCrypto pitfalls. |
I opened an issue in the security-wg nodejs/security-wg#339 to discuss some of the broader issues that are being brought up here. I personally think that we should be very careful adding features to |
@tniessen in this repo, I use Vulnerabilities in Node.js itself do not belong here and are discussed in a private repo, the label is not for those. I.e. I think that having a tl;dr: the «security» label does not have a description «vulnerabilities in Node.js core», it has a description «Issues and PRs related to security». This issue is related to security. |
This is precisely what I'm worried about. I would be less concerned if there were eg. a high-level This issue really isn't so much about the implementation specifics, as it is about the API that is presented to the user, and what options are made to look like the obvious ones. The pit of success is a relevant consideration here. A compounding issue is that a lot of developers have the tendency to prefer things provided by the ES specs or by Node.js core over external modules, even if the external module is a justifiably better option; while for something like a HTTP server this will just mean that developers are wasting their time, for something security-critical like this it means that people will be writing insecure code. It is therefore important to ensure that the core libraries are as safe as possible, to match the expectations that users have of them. |
Almost none of the crypto APIs could be really considered safe for the crypto-unaware developer, but they are exposing underlining crypto functions. This is also true for APIs that might seems innocent but if misused could easily create DoS vectors. Node core is full of those: people advertises their usage (badly) all the time. I think the doc must show a safe way to use this API, and this is fixable right now. |
"Showing a safe way to use this API", by which I suspect you mean "examples of using it safely", are not sufficient; this has been tried by other languages for decades and turned out to simply not work in practice (due to aforementioned 'tutorial rot', in part). This is a large part of why eg. PHP is now just implementing safe-by-default APIs that cannot be misused this way. Safe-by-default APIs do not allow for the correct usage to become decoupled from the API. |
I couldn't agree more with @mcollina, this problem is not restricted to scrypt or crypto. Improper use of APIs will always create security issues, our task is to help minimize such problems. As I said before, e.g. in nodejs/security-wg#339, I am not opposed to a safer/high-level API, but people can (and will) still use "unsafe" APIs, some of them improperly. And that still is not a reason to remove such APIs as @joepie91 suggested. @joepie91 I would love to discuss a safer API with you via IRC, Slack or the like, let me know if you are up for it. |
I agree with @mcollina. We can't remove an API just because developers can use it bad. Rather, strong documentation is required, which should be good enough for this use case. |
Please do not bake new APIs like in a bakery. Its better to update documentation. |
Interesting assertion. Why do you believe this to be true? @joepie91 claimed the following above:
|
@bricss: it's precisely this reason why a fit-for-purpose API should be exposed ASAP - an unsafe option was added, and crypto primitives are extremely difficult to remove when people rely on the algorithm being available. https://xkcd.com/1172/ so we should always provide a fit for purpose API for people when the 99% of the use the API for password hashing, since developers frequently make up parameters when they come to use them (it's a foot gun) Encapsulating such concepts in a simple API for password hashing (as PHP has done) means you can also transition to new algorithms easily. edit: hit shift and enter, submitted before I was done |
So, the proposal that I have, for the current branch (10.x):
Outright removal might be too breaking, but the above might be fine. /cc @nodejs/tsc — I believe that's somewhere among the lines that we discussed today (i.e. deprecating in 10.x, removing in 11.x), is that correct? Also /cc @nodejs/security-wg (and specifically @drifkin) for input (nodejs/security-wg#339). Also, please don't remove the |
@ChALkeR That seems like a reasonable solution to me. It would avoid hard-breaking while still making it very difficult to miss the unsafety of the API. |
@tniessen That's not as convincing of an argument as you may believe it to be. The current use of |
Won't necessarily help for this specific issue, but in the discussion in the TSC meeting today we talked about requiring sign-off from the security working group for new security-related APIs (as mentioned earlier in this discussion). Not everybody was in attendance but from those who were there, no objections were voiced. I'll draft a PR to add something along these lines to our onboarding docs tomorrow and we can see what the broader collaborator community thinks. |
@tniessen there is already an ongoing discussion about the Also do note that we have a history of fixing things that were designed unsafe, including Buffer and the http module. I would prefer to keep the discussion in this specific issue limited to what to do with the Re: |
👍@ChALkeR: I think given that reverting is considered semver major, this is a very good solution. As @joepie91 says above this will make it really unlikely that someone unknowingly uses the "unsafe" version. Just a reminder that for the high-level API, we'll need more than just |
The |
And I still believe that it's better to update the documentation, than rename or spawn methods in API. Documentation should lead to clarity. Developers should read and understand what is going on behind the wheel, in any way, and not blindly use some magic wand API. Just take a look at Haskell example: http://hackage.haskell.org/package/scrypt/docs/Crypto-Scrypt.html Plus we already have high-level lib for it: https://www.npmjs.com/package/scrypt-for-humans |
Developers aren't homogenous. Some will read the official documentation directly (and keep themselves up to date), others will understand it filtered through podcasts, vlogs, blogs, and technical discussions on websites like Reddit or HN. What mechanism do you have to ensure all the secondary and tertiary sources of developer understanding beyond the official documentation get updated in a timely fashion? How do you inform every Node.js developer on the planet that they need to refresh their current understanding of the language and recent changes? Because arguing for "just update the documentation" just kicks the can down the road, so that the other developers can be "blamed" for writing insecure code, and doesn't actually improve security.
The author of the high-level library is @joepie91 who I am quite certain disagrees with your argument in this discussion. (He can speak for himself on this point, of course.) |
This argument doesn't make a lot of sense. The point of documentation is to explain, and I never called into question the effectiveness of using documentation for that purpose. What I'm calling into question is the effectiveness of using it to warn, which is pretty well-known to just.. not work. Therefore, people ignoring warnings in documentation (which they frequently do, especially when writing their own material, since it is in their eyes not necessary for understanding the documented thing), does not in any way translate to "we don't need documentation at all"; it still fulfills the purpose of explanation just fine. We just shouldn't rely on it for the purpose it's bad at, ie. "warning people".
I fully agree. Unfortunately, that's not what developers actually do, with copious security issues as a result (that people other than the developer suffer from!), and there is no reason to believe that this will ever change given human nature. Therefore everybody in the chain, including the core team, has a responsibility to strive for harm reduction even for the cases where developers just plain aren't paying attention. Essentially, "developers should just pay attention" is an ideological argument, not a pragmatic one.
As @paragonie-scott already pointed out, I'm the author of that library. It currently wraps In fact, the way I found out about this addition to core in the first place, was because somebody said "it's in core now!" when I suggested to somebody that they should use |
Some recent dicsussions point to it being a good idea to require reviews from the security-wg for security related PRs. See nodejs#21766 Add this requirement to the collaborator guide.
@ChALkeR Should this still be left on the TSC agenda? If so, will you be able to attend this week's meeting or is this likely to need to be discussed at a future meeting instead? |
Ping @ChALkeR |
@ChALkeR Should this still be left on the TSC agenda? If so, will you be able to attend this week's meeting or is this likely to need to be discussed at a future meeting instead? |
Ping @ChALkeR |
I'm closing out this issue because the discussion seems to have stalled without reaching consensus. One way forward is to propose a generic, higher-level API - i.e., covering more than just scrypt.
|
In a few words: The new scrypt API in v10.5 is dangerously designed and will cause people to make security mistakes. A new API is needed for the 98% problem (i.e. password hashing). Additionally, the documentation for the old API should make it abundantly clear that it's not meant for non-expert users, and to instead use whatever the new API is called.
Copying my comment (with slight corrections) from #20816
This is how PHP does password hashing:
This is almost an optimal UX for PHP developers for password storage: Salts are explicitly generated by the kernel's CSPRNG, encoded, and included in the password hash.
A step further would be making
PASSWORD_DEFAULT
--, well, the default.You should only need one input for generating a new password hash: The password.
You should only need two inputs for verification: The challenge and the attempt (or the hash and password, respectively).
All other parameters should be optional.
Note: Key derivation is a separate concern, where you don't want the salt stored alongside the password hash, but that's a smaller corner of the cryptography usability market than password hashing.
Let's look at how another library handles both corner cases:
Key Derivation
Password Hashing
Usable cryptography API design is a nontrivial undertaking, and getting it wrong will mean years (or even decades) of clean-up.
I would propose, at minimum, an alternative API that has a similar user experience to PHP's
password_hash()
that transparently wraps scrypt as part of the Node.js core, and then recommend that API for users who want to store password hashes (which is roughly 98% of the use case when someone reaches for bcrypt, scrypt, or Argon2).Or you could always just incorporate the design of @joepie91's
scrypt-for-humans
into the Node.js core. Designing cryptography APIs for humans is a good idea.The text was updated successfully, but these errors were encountered: