How Does Apache Shiro Hash Salted Passwords? -
if use apache shiro command line tool generate password
java -jar shiro-tools-hasher-1.3.1-cli.jar -p -a sha-512
and use password password
$shiro1$sha-512$500000$wnjbm5pwpwn5784aq7i7qa==$iqj6xdwuktcnqjcu982czr6b4a3lngp2f/wd8tmwvc7sanogeuugtbbj/ki9fqiibx/ngf9rjd+5iy971d88cg==
the documentation says hashing salted default , defaults 500k iterations , testing results in different password each time assume is.
i can log in without specifying salt anywhere though
subject currentuser = securityutils.getsubject(); usernamepasswordtoken token = new usernamepasswordtoken("jsmith", "password"); token.setrememberme(true); currentuser.login(token);
the place can see must in hash.
if can see sections:
$shiro1
shows shiro hashed password$sha-512
shows algorithm used$500000
shows number of iterations
the salt after section or @ end.
is dangerous approach?
are apache shiro exposing information here , making easier create attack?
Comments
Post a Comment