密码哈希算法用于无状态基本身份验证 API 是什么?

huangapple go评论117阅读模式
英文:

How password hash algorithm for stateless basic authentication api?

问题

我有一个使用spring框架的Web服务API,它会从一个属性文件中对用户进行身份验证。到目前为止,密码是使用bcrypt算法进行存储的。

问题:我的API是无状态的,因此任何basic auth请求都会强制进行bcrypt身份验证的重新计算,从而导致每个请求大约100ms的延迟。

问题:在无状态API的每个请求中都要使用的用户密码加密算法(无论是在属性文件还是数据库中),有哪些建议使用的算法?

重点考虑身份验证性能,但不忽视安全性。

英文:

I have a spring webservice api that authenticates users from a properties file. The passwords are stored in bcrypt algorithm so far.

Problem: my api is stateless, thus any basic auth request will force bcrypt authentication to recalculate, causing delays of approx 100ms on each request.

Question: which algorithm is advised to be used for encrypting user passwords (no matter if in properties file or db), that are to be used on every request on a stateless api?

With focus on authentication performance, but not neglecting security.

答案1

得分: 3

我会跳过加密密码,改用令牌。一个这样的解决方案是JWT(Json Web Tokens),Spring已经默认支持它们。

你可以在这里查看一个示例:这里

你甚至可以更进一步(这是我的做法),将所有这些都委托给一个OAuth提供者。我通常使用Keycloak来实现这一点。

英文:

I'd skip encrypting the password and use tokens instead. One such solution is JWT (Json Web Tokens) and Spring comes with support for them out of the box.

You can take a look at an example here.

You can go even further (this is what I do) and delegate all of this into an OAuth provider. I usually use Keycloak for this.

答案2

得分: -2

最终,我决定创建一个缓存身份验证处理程序。它会缓存基本身份验证的密码,以及相应的哈希 bcrypt 字符串。但仅在认证成功时才会缓存。

这样,我可以加速已知客户端的有效身份验证(因为我不必为它们重新计算 bcrypt 哈希匹配),但仍然保留了 bcrypt 算法的防暴力破解优势。

如下是 Spring 特定的实现:

  1. static class CachingDelegatingPasswordEncoder implements PasswordEncoder {
  2. private final PasswordEncoder delegate = PasswordEncoderFactories.createDelegatingPasswordEncoder();
  3. private final Map<String, String> cache = new HashMap<>();
  4. @Override
  5. public String encode(CharSequence rawPassword) {
  6. return delegate.encode(rawPassword);
  7. }
  8. @Override
  9. public boolean matches(CharSequence rawPassword, String encodedPassword) {
  10. String cachedPassword = cache.get(rawPassword);
  11. if (cachedPassword != null && StringUtils.equals(cachedPassword, encodedPassword))
  12. return true;
  13. boolean match = delegate.matches(rawPassword, encodedPassword);
  14. if (match) cache.put(rawPassword.toString(), encodedPassword);
  15. return match;
  16. }
  17. }
  18. @Configuration
  19. static class AuthenticationConfiguration extends GlobalAuthenticationConfigurerAdapter {
  20. @Autowired
  21. private UserDetailsService userDetailsService;
  22. @Override
  23. public void configure(AuthenticationManagerBuilder builder) throws Exception {
  24. DaoAuthenticationProvider p = new DaoAuthenticationProvider();
  25. p.setPasswordEncoder(new CachingDelegatingPasswordEncoder());
  26. p.setUserDetailsService(userDetailsService);
  27. p.afterPropertiesSet();
  28. builder.authenticationProvider(p);
  29. }
  30. }
英文:

In the end I decided to create a caching authentication handler. It cashes the password from basic auth, and the belonging hashed bcrypt string. But only if authentication was successful.

This way I can speed up known clients with valid authentications (as I won't have to recalculate the bcrypt hash match for them), but still keep the brutforce benefits from bcrypt algorithm.

As follows the spring-specific implementation:

  1. static class CachingDelegatingPasswordEncoder implements PasswordEncoder {
  2. private final PasswordEncoder delegate = PasswordEncoderFactories.createDelegatingPasswordEncoder();
  3. private final Map&lt;String, String&gt; cache = new HashMap&lt;&gt;();
  4. @Override
  5. public String encode(CharSequence rawPassword) {
  6. return delegate.encode(rawPassword);
  7. }
  8. @Override
  9. public boolean matches(CharSequence rawPassword, String encodedPassword) {
  10. String cachedPassword = cache.get(rawPassword);
  11. if (cachedPassword != null &amp;&amp; StringUtils.equals(cachedPassword, encodedPassword))
  12. return true;
  13. boolean match = delegate.matches(rawPassword, encodedPassword);
  14. if (match) cache.put(rawPassword.toString(), encodedPassword);
  15. return match;
  16. }
  17. }
  18. @Configuration
  19. static class AuthenticationConfiguration extends GlobalAuthenticationConfigurerAdapter {
  20. @Autowired
  21. private UserDetailsService userDetailsService;
  22. @Override
  23. public void configure(AuthenticationManagerBuilder builder) throws Exception {
  24. DaoAuthenticationProvider p = new DaoAuthenticationProvider();
  25. p.setPasswordEncoder(new CachingDelegatingPasswordEncoder());
  26. p.setUserDetailsService(userDetailsService);
  27. p.afterPropertiesSet();
  28. builder.authenticationProvider(p);
  29. }
  30. }

huangapple
  • 本文由 发表于 2020年10月14日 20:16:43
  • 转载请务必保留本文链接:https://go.coder-hub.com/64353075.html
匿名

发表评论

匿名网友

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen:

确定