Django Password
Django provides a flexible password storage system and uses PBKDF2 by default. Django saves the password as below.
<algorithm>$<iterations>$<salt>$<hash>
example of a Hashed password stored in database:
pbkdf2_sha256$390000$LCm33kvO7rbjbZhwJA90Sf$xfuGOzl/MJyUxqWNhsNdSThaQUvn1EjEfxZ48HA8HF4=
Those are the components used for storing a User’s password,separated by the dollar-sign character and consist of:
1. The hashing algorithm
2. The number of algorithm iterations (work factor)
3. The random salt
4. The resulting password hash.
Most password hashes include a salt along with their password hash in order to protect against rainbow table attacks.
Example of Making Hashed password:
Here’s a simplified overview of how Django handles password storage:
1. Password Creation or Change:
- # When someone creates a new account or decides to change their password, Django takes their chosen password and performs a process called hashing. Hashing is like scrambling the password into a format that is hard to reverse.
- # To add an extra layer of security, Django also generates a random value called a "salt." This salt is mixed with the password before hashing. Think of it like adding a secret ingredient to a recipe.
2. Storing the Password:
- # After hashing the password with the salt, Django saves both the resulting scrambled password (technically called a hash) and the salt into the database. It's like putting the locked recipe (hash) and the secret ingredient (salt) into a safe (database) for later use.
3. Logging In:
- # When a user wants to log in, they provide their username and password.
- # Django looks up the stored hash and salt associated with that username from the database.
4. Verifying the Password:
- # Django then takes the password provided during login and repeats the hashing process using the stored salt.
- # If the result of this process matches the stored hash, it means the provided password is correct. It's like recreating the locked recipe using the same secret ingredient. If the recreated recipe matches the one stored in the safe, Django lets the user in.
This process ensures that user passwords are stored securely and cannot be easily compromised, even if an attacker gains access to the database.
# Why django uses 'random' salt beside 'one' salt string?
Because if you would have one salt you could generate rainbow tables attack for your database easier than when there are random salts.
If you would like to generate rainbow tables to decrypt django hashes you would have to generate tables for each different salt in database. Generating of rainbow tables take very long time, it's just brute force or dictionary attack.
By default, Django uses the PBKDF2 algorithm with a SHA256 hash, a password stretching mechanism recommended by NIST. This should be sufficient for most users: it’s quite secure, requiring massive amounts of computing time to break.
If anyone need to use different password Hashing Algorithm then it's flexible to do in django.
# How to use different Password Hashing Algorithm ?
Django chooses the algorithm to use by consulting the PASSWORD_HASHERS in settings.py.
This is a list of hashing algorithm classes that this Django installation supports. For storing passwords, Django will use the first hasher in PASSWORD_HASHERS. To store new passwords with a different algorithm, put your preferred algorithm first in PASSWORD_HASHERS.
PASSWORD_HASHERS = [
"django.contrib.auth.hashers.PBKDF2PasswordHasher",
"django.contrib.auth.hashers.PBKDF2SHA1PasswordHasher",
"django.contrib.auth.hashers.Argon2PasswordHasher", "django.contrib.auth.hashers.BCryptSHA256PasswordHasher",
"django.contrib.auth.hashers.ScryptPasswordHasher",
]
For verifying passwords, Django will find the hasher in the list that matches the algorithm name in the stored password. If a stored password names an algorithm not found in PASSWORD_HASHERS, trying to verify it will raise ValueError.
All references are taken from Django official doc
Author:
Mahfujul Hasan
Software Engineer
linkedIn: https://www.linkedin.com/in/shojibhasan/
Comments
Post a Comment