-
-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Salt Encoding inconsistency between Caddyfile basicauth and hash-password #3580
Comments
IMO, we should either simply not support hashing algorithms that require salts (remove scrypt support, keeping only bcrypt), or always randomly generate the salt if the algorithm requires it and embed it in the generated hash. Currently Caddy only takes base64 encoded strings as input, but the only reason this was necessary was to support scrypt which gives its hash in binary in the Go implementation. The bcrypt alg has a nice format using $ as separators for each part. The hash-password command also currently doesn't support configuring a the work factor for the algorithms, so bcrypt is always using a work factor of 10 which is arguably kinda weak in 2020. Since the work factor is embedded in the hash though, users can provide their own stronger hashes by generating it elsewhere then base64 encoding the hash before giving it to Caddy... But that's not user-friendly at all. |
Thanks for bringing this up. Turns out there's a proposal to introduce nicer, bcrypt-like APIs for scrypt, argon2, etc, in Go: golang/go#16971 Meanwhile, we can raise the cost factor to 14 in Caddy. That should be plenty future-proof for now. Edit: I'll circle back on the main topic of this thread when I have a chance. Still swamped trying to get the site upgrades finished. |
I think increasing the default work factor is viable now that #3465 was implemented. Beforehand, that would've been super infeasible because it would make Caddy's resource usage so high if Caddy gets hammered with auth requests. |
We can probably change/fix the Is there any convenient way to pass raw bytes into a command line argument? I feel like it's a bug then and should accept the base64-encoded salt instead. Or if that's not really a good API, then maybe we should drop the |
I would prefer that. (Or drop scrypt altogether but I digress.) I can do this one soon unless @0az wants to take a crack at it |
Scrypt and other modern KDFs are typically more recommended than bcrypt by cryptographers, from my conversations with some. But scrypt does need better APIs. They're coming, as I linked to above. Maybe we should wait until then, and add a note in the docs that it's possible that the command / config could be changing? |
I don't understand; Is the current bcrypt implementation throwing away the salt? I generated my hash using On the lack of tooling in go; Can't you use another language for doing this part? Python has the passlib library, for example. I imagine there must be good C++ libraries, too. |
|
I think this'll be resolved by #4720. I don't think we should keep scrypt, and we don't need the extra base64 encoding for bcrypt. |
The basicauth directive expects a base64-encoded salt, whereas the hash-password command expects an unencoded salt: it takes raw bytes in from the command line. This is pretty confusing: I had to pull out Delve despite submitting a small patch to the aforementioned command several months ago. I think I might have also run into it then when testing said patch, as well.
I think there's
threefour ways to resolve this:-salt
to take in base64. This is a breaking change, so it's probably a bad idea.-salt-base64
option to take in base64. This is relatively self documenting, and also indicates that the plain-salt
argument does not take in base64 by virtue of existing.-use-base64-salt
option that changes-salt
's behavior. This has the advantages of (2), and easily allows for a deprecation cycle and flag day.Thoughts?
The text was updated successfully, but these errors were encountered: