-
-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Checking an already-hashed password #17
Comments
I guess my first question for this is what is the use case? You said:
But I wouldn't want to encourage anyone to store passwords as unsalted SHA-1 hashes. And the only use I can think of for this feature would be to enable those who had stored passwords in that manner. Do you have any other use cases for it? What is the case you want to use it like this for? |
Well, I soon realized that the original use case that I wanted this for — to check to what extent / how many existing accounts are using compromised passwords, in order to better decide whether it would make sense to send out a mass notification asking all users to change their password, what user flow would make most sense to build, etc. — is unfortunately not possible to solve 😞, for the same reason that #10 is (also unfortunately) not possible, and because the password are encrypted with I can think of other possible use cases for this feature, but honestly, they may not be very likely and not ones I have currently. Perhaps the strongest use case is a user of this library being paranoid and not wanting to trust this library with a plain-text password. I can imagine some users, after reading the API docs and seeing that their privacy is protected by a k-Anonymity model that only requires a hash (a partial hash on the remote end, full hash on the local end) to perform the lookup, may wonder why this library even requires the plain-text password at all then. Perhaps they're looping through their own password list in order to do a checkup of their own passwords (since not everyone uses 1Password which has that feature built-in). Like Troy Hunt said,
Allowing a hashed password to be passed to this client would safeguard against the possibility that a compromised version of this library (that secretly sent the plain-text password to a nefarious remote endpoint) got published and used by an application. I audited the source code of the current version for security holes, but I probably wouldn't remember to do that every time I did a So I guess my strongest argument for adding this feature is that since the client doesn't technically need to see the plain-text password, then, by the Principle of least privilege, it should not be passed to it — or at least should not require you to pass it to it. Since the remote API only requires a hash of the password, then it would seem reasonable for users of this client to be able to use it in the same way if they wanted. Maybe that's taking it too far. (I'm not usually that paranoid myself, though maybe I should be. I am paranoid enough that I refuse to trust a closed-source password manager like 1Password to manage my passwords though.) I have nothing to urge. Just something to think about. |
Paranoia is a decent argument when talking security. Adding a method to set the hashed_password instead of the plain text would not add a lot of code and would keep the plain text out of the hands of my gem. If you want to open a PR for that, then I would happily review and accept it. |
This has been implemented and released in version 2.1.0. See the updates in #20. |
It would be nice if there was a first-class way to check a password that is already SHA-1 hashed. If that's all I have, I obviously can't simply unhash it. Since this is what https://api.pwnedpasswords.com/range/ expects already, it would be easy to support this option as well.
Especially since the data that gets sent is based on
hashed_password
, which only looks at the plain-textpassword
if@hashed_password
is not yet initialized:So we just need a way to initialize a
Password
object with ahashed_password
. Would you accept a PR that adds that? And any preference on an API to initialize such a password?I think this might be the nicest interface:
as long as you're okay with ad hoc polymorphism being used for
password
param:Another option might be:
One use case of this is to check how many user accounts have compromised passwords (assuming passwords are stored in SHA-1, which they probably aren't).
If there's not enough interest, I could always just use this workaround...
The text was updated successfully, but these errors were encountered: