mirror of
https://github.com/astaxie/beego.git
synced 2024-11-22 13:10:54 +00:00
update hash algorithm for signing the cookie for xsrf token
Due to the chosen-prefix collision in SHA-1(details at https://sha-mbles.github.io/), SHA-1 hash functions should to be deprecated and SHA-2/SHA-3 should be used instead. Signed-off-by: wang yan <wangyan@vmware.com>
This commit is contained in:
parent
aa90c67a75
commit
a768bf8f00
@ -25,7 +25,7 @@ package context
|
|||||||
import (
|
import (
|
||||||
"bufio"
|
"bufio"
|
||||||
"crypto/hmac"
|
"crypto/hmac"
|
||||||
"crypto/sha1"
|
"crypto/sha256"
|
||||||
"encoding/base64"
|
"encoding/base64"
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
@ -123,7 +123,7 @@ func (ctx *Context) GetSecureCookie(Secret, key string) (string, bool) {
|
|||||||
timestamp := parts[1]
|
timestamp := parts[1]
|
||||||
sig := parts[2]
|
sig := parts[2]
|
||||||
|
|
||||||
h := hmac.New(sha1.New, []byte(Secret))
|
h := hmac.New(sha256.New, []byte(Secret))
|
||||||
fmt.Fprintf(h, "%s%s", vs, timestamp)
|
fmt.Fprintf(h, "%s%s", vs, timestamp)
|
||||||
|
|
||||||
if fmt.Sprintf("%02x", h.Sum(nil)) != sig {
|
if fmt.Sprintf("%02x", h.Sum(nil)) != sig {
|
||||||
@ -137,7 +137,7 @@ func (ctx *Context) GetSecureCookie(Secret, key string) (string, bool) {
|
|||||||
func (ctx *Context) SetSecureCookie(Secret, name, value string, others ...interface{}) {
|
func (ctx *Context) SetSecureCookie(Secret, name, value string, others ...interface{}) {
|
||||||
vs := base64.URLEncoding.EncodeToString([]byte(value))
|
vs := base64.URLEncoding.EncodeToString([]byte(value))
|
||||||
timestamp := strconv.FormatInt(time.Now().UnixNano(), 10)
|
timestamp := strconv.FormatInt(time.Now().UnixNano(), 10)
|
||||||
h := hmac.New(sha1.New, []byte(Secret))
|
h := hmac.New(sha256.New, []byte(Secret))
|
||||||
fmt.Fprintf(h, "%s%s", vs, timestamp)
|
fmt.Fprintf(h, "%s%s", vs, timestamp)
|
||||||
sig := fmt.Sprintf("%02x", h.Sum(nil))
|
sig := fmt.Sprintf("%02x", h.Sum(nil))
|
||||||
cookie := strings.Join([]string{vs, timestamp, sig}, "|")
|
cookie := strings.Join([]string{vs, timestamp, sig}, "|")
|
||||||
|
@ -19,7 +19,7 @@ import (
|
|||||||
"crypto/cipher"
|
"crypto/cipher"
|
||||||
"crypto/hmac"
|
"crypto/hmac"
|
||||||
"crypto/rand"
|
"crypto/rand"
|
||||||
"crypto/sha1"
|
"crypto/sha256"
|
||||||
"crypto/subtle"
|
"crypto/subtle"
|
||||||
"encoding/base64"
|
"encoding/base64"
|
||||||
"encoding/gob"
|
"encoding/gob"
|
||||||
@ -129,7 +129,7 @@ func encodeCookie(block cipher.Block, hashKey, name string, value map[interface{
|
|||||||
b = encode(b)
|
b = encode(b)
|
||||||
// 3. Create MAC for "name|date|value". Extra pipe to be used later.
|
// 3. Create MAC for "name|date|value". Extra pipe to be used later.
|
||||||
b = []byte(fmt.Sprintf("%s|%d|%s|", name, time.Now().UTC().Unix(), b))
|
b = []byte(fmt.Sprintf("%s|%d|%s|", name, time.Now().UTC().Unix(), b))
|
||||||
h := hmac.New(sha1.New, []byte(hashKey))
|
h := hmac.New(sha256.New, []byte(hashKey))
|
||||||
h.Write(b)
|
h.Write(b)
|
||||||
sig := h.Sum(nil)
|
sig := h.Sum(nil)
|
||||||
// Append mac, remove name.
|
// Append mac, remove name.
|
||||||
@ -153,7 +153,7 @@ func decodeCookie(block cipher.Block, hashKey, name, value string, gcmaxlifetime
|
|||||||
}
|
}
|
||||||
|
|
||||||
b = append([]byte(name+"|"), b[:len(b)-len(parts[2])]...)
|
b = append([]byte(name+"|"), b[:len(b)-len(parts[2])]...)
|
||||||
h := hmac.New(sha1.New, []byte(hashKey))
|
h := hmac.New(sha256.New, []byte(hashKey))
|
||||||
h.Write(b)
|
h.Write(b)
|
||||||
sig := h.Sum(nil)
|
sig := h.Sum(nil)
|
||||||
if len(sig) != len(parts[2]) || subtle.ConstantTimeCompare(sig, parts[2]) != 1 {
|
if len(sig) != len(parts[2]) || subtle.ConstantTimeCompare(sig, parts[2]) != 1 {
|
||||||
|
Loading…
Reference in New Issue
Block a user