Skip to content

Conversation

@codingjoe
Copy link
Owner

Since the password was set to None, the session hash was always
identical and predictable for an attacker. A new random salt is
added to replace the password which served this funciton before.

Should the new session salt is set be default to a rendom value.
Should the salt be set to None for some reason, the
get_session_auth_hash method will raise a ValueError.

The password field is now removed from the user model. It will
raise a FieldDoesNotExist error, should the attribute be
access further preventing similar security issues.

@codecov
Copy link

codecov bot commented May 28, 2019

Codecov Report

Merging #1 into master will not change coverage.
The diff coverage is 100%.

Impacted file tree graph

@@ Coverage Diff @@ ## master #1 +/- ## ===================================== Coverage 100% 100% ===================================== Files 11 12 +1 Lines 188 201 +13 ===================================== + Hits 188 201 +13
Impacted Files Coverage Δ
...rib/user/migrations/0002_emailuser_session_salt.py 100% <100%> (ø)
mailauth/contrib/user/models.py 100% <100%> (ø) ⬆️

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update f1e07a1...de1d0bf. Read the comment docs.

Since the password was set to None, the session hash was always identical and predictable for an attacker. A new random salt is added to replace the password which served this funciton before. Should the new session salt is set be default to a rendom value. Should the salt be set to None for some reason, the `get_session_auth_hash` method will raise a `ValueError`. The password field is now removed from the user model. It will raise a `FieldDoesNotExist` error, should the attribute be access further preventing similar security issues.
@codingjoe codingjoe merged commit 21d608c into master May 28, 2019
@codingjoe codingjoe deleted the session-key branch May 28, 2019 12:02
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

2 participants