How Does Apache Shiro Hash Salted Passwords? -


if use apache shiro command line tool generate password

java -jar shiro-tools-hasher-1.3.1-cli.jar -p -a sha-512 

and use password password

$shiro1$sha-512$500000$wnjbm5pwpwn5784aq7i7qa==$iqj6xdwuktcnqjcu982czr6b4a3lngp2f/wd8tmwvc7sanogeuugtbbj/ki9fqiibx/ngf9rjd+5iy971d88cg== 

the documentation says hashing salted default , defaults 500k iterations , testing results in different password each time assume is.

i can log in without specifying salt anywhere though

subject currentuser = securityutils.getsubject(); usernamepasswordtoken token = new usernamepasswordtoken("jsmith", "password"); token.setrememberme(true); currentuser.login(token); 

the place can see must in hash.

if can see sections:

  • $shiro1 shows shiro hashed password
  • $sha-512 shows algorithm used
  • $500000 shows number of iterations

the salt after section or @ end.

is dangerous approach?

are apache shiro exposing information here , making easier create attack?


Comments

Popular posts from this blog

javascript - Thinglink image not visible until browser resize -

firebird - Error "invalid transaction handle (expecting explicit transaction start)" executing script from Delphi -

mongodb - How to keep track of users making Stripe Payments -