aprendiendophp
¿Quieres reaccionar a este mensaje? Regístrate en el foro con unos pocos clics o inicia sesión para continuar.

aprendiendophp

Aprendiendo juntos PHP y MySQL, como complemento de otras herramientas Web, para comercio, paginas personales, etc, bases de datos, foros, etc.-
 
ÍndiceÚltimas imágenesBuscarRegistrarseConectarse

 

 Modelo de Almacenamiento Encriptado

Ir abajo 
AutorMensaje
Admin
Admin



Mensajes : 17
Fecha de inscripción : 14/10/2008

Modelo de Almacenamiento Encriptado Empty
MensajeTema: Modelo de Almacenamiento Encriptado   Modelo de Almacenamiento Encriptado Icon_minitimeMar Oct 14, 2008 2:22 pm

Modelo de Almacenamiento Encriptado

SSL/SSH protege los datos que viajan desde el cliente al servidor, SSL/SSH no protege los datos persistentes almacenados en la base de datos. SSL es un protocolo sobre-el-cable.

Una vez el atacante adquiere acceso directo a su base de datos (evitando el paso por el servidor web), los datos críticos almacenados pueden estar expuestos o malutilizados, a menos que la información esté protegida en la base de datos misma. La encripción de datos es una buena forma de mitigar esta amenaza, pero muy pocas bases de datos ofrecen este tipo de mecanismo de encripción de datos.

La forma más sencilla de evitar este problema es crear primero su propio paquete de encripción, y luego utilizarlo desde sus scripts de PHP. PHP puede ayudarle en este sentido con varias extensiones, como Mcrypt y Mhash, las cuales cubren una amplia variedad de algoritmos de encripción. El script encripta los datos antes de insertarlos en la base de datos, y los decripta cuando los recupera. Vea las referencias para consultar más ejemplos de cómo opera la encripción.

En el caso de datos realmente escondidos, si su representación original no se necesita (es decir, no debe ser desplegada), los resúmenes criptográficos pueden llegar a considerarse también. El ejemplo clásico de gestión de resúmenes criptogáficos es el almacenamiento de secuencias MD5 de una contraseña en una base de datos, en lugar de la contraseña misma. Vea también crypt() y md5().

Example #1 Uso de un campo de contraseñas encriptado
<?php

// almacenamiento de resumen criptográfico de la contraseña
$consulta = sprintf("INSERT INTO usuarios(nombre,contr) VALUES('%s','%s');",
pg_escape_string($nombre_usuario), md5($contrasenya));
$resultado = pg_query($conexion, $consulta);


// consulta de verificación de la contraseña enviada
$consulta = sprintf("SELECT 1 FROM usuarios WHERE nombre='%s' AND contr='%s';",
pg_escape_string($nombre_usuario), md5($contrasenya));
$resultado = pg_query($conexion, $consulta);

if (pg_num_rows($resultado) > 0) {
echo '¡Bienvenido, $nombre_usuario!';
}
else {
echo 'No pudo autenticarse a $nombre_usuario.';
}

?>


Inyección de SQL> <Conexión con la Base de Datos Last updated: Fri, 22 Aug 2008

add a note add a note User Contributed Notes
Modelo de Almacenamiento Encriptado
zyppora at nosmac yahoo dot com
14-Mar-2007 05:30
In addition to roysimkes at hotmail dot com:

If your passwords are so secret that they're worth a year's hacking/cracking/etc, you might want to consider 'password renewal', much like Windows' option. Tell your users to renew their passwords every x days/weeks/months to make it extra hard on those already-sweating malicious visitors.
somebody
26-Dec-2006 10:07
A better way to hash would be to use a separate salt for each user. Changing the salt upon each password update will ensure the hashes do not become stale.
Ketos
02-Nov-2006 04:05
You should always hash the password with the username, so store md5($password . $username) instead of md5($password) This way the cracker cannot use a precomputed set of hashes of common keys, but has to recompute the hashes for each user.

Double hashing also can help in some situations as it solves length extension problems with all hash functions. Also you should use SHA-256, as it has a longer hash length and thus it takes 2^128 steps to find a collision
roysimkes at hotmail dot com
17-Aug-2006 05:10
But the thing in double hashing is to increase the time that they can crack your password! A passwod that takes a year to break is quite secure(!)
And even if they learn somehow that you are double hashing your passwords, how will they learn which one you are using first! Instead of using md5() twice try using sha1(md5()) or vice versa. An the breaker should check more things. For only one password he has to check at least 4 different types (md5 only, sha1 only, md5(sha1) and sha1(md5) ) it will take quite a time to break it! (Yeah if he can see your source files it doesn't mean anything. But if they can see that files, you are already dead in the water)
And also put a salt variable in it! If that's random salt, it will take a very long time to crack the password. The best security is to use a hybrid solution. If you add salt to your passwords they have to use your app to crack the code. And if you add some more features like after 3 times password failure add a secret question and a secret answer, a visual confirmation code! Things are getting complicated for the automated script!
Well yes if you want to protect something, do not publish them in the internet. With enough dedication, time and resources every password can be cracked. But if the time is more then years, who will waste time on it? Or the password to be cracked worth that time?
dan[ddot) crowley [att]gmail {dott]com
13-Jul-2006 01:31
A note to the people who think that hashing a password multiple times makes it uncrackable:

It doesn't.

If you're using a standard hash cracker or rainbow tables, sure. But if you've got the smarts to design your own hash cracker, you can just double-hash every string where it would normally be hashed once, and then at best your hashes take twice as long to crack.
Fairydave at the location of dodo.com.au
11-Feb-2006 06:58
I think the best way to have a salt is not to randomly generate one or store a fixed one. Often more than just a password is saved, so use the extra data. Use things like the username, signup date, user ID, anything which is saved in the same table. That way you save on space used by not storing the salt for each user.

Although your method can always be broken if the hacker gets access to your database AND your file, you can make it more difficult. Use different user data depending on random things, the code doesn't need to make sense, just produce the same result each time. For example:

if ((asc(username character 5) > asc(username character 2))
{
if (month the account created > 6)
salt = ddmmyyyy of account created date
else
salt = yyyyddmm of account created date
}
else
{
if (day of account created > 15)
salt = user id * asc(username character 3)
else
salt = user id + asc(username character 1) + asc(username character 4)
}

This wont prevent them from reading passwords when they have both database and file access, but it will confuse them and slow them up without much more processing power required to create a random salt
3M
05-Oct-2005 08:46
Be smart and simple!

1. Hash a password once on twice! It's sufficient to use SHA-1 twice! (read no.3)
2. Limit the number of log-in trys per ip! This will be a hard hit for online brute force crackers!
3. The comments below that suggest using a SALT whit MD5 ar good as long as the length of the resulting string (password + SALT) is bigger then the output of the hashing algorithm. For example: SHA-1 has an output of 160 bits or 20 ASCII chars. If the password set has 8 chars then the salt would have to be of 12 chars or longer... the longer the better!
The idea here is that by trying to brute force a hash (second) that was computed from another hash (first) from a large string would result in many collisions that will make it impossible to distinguish between them and the first hash of the password!
4. If possible use HMAC for added security! This will prevent sending the same generated hash from a paswrod in the tcp/udp packets... each time the pasword field in tha data packets will contain a different hash (HMAC'ed) but on server side will be decoded to the real hash. For this you will need to design a solution for sending the password needed for HMAC!
blodo at poczta dot fm
07-Jul-2005 02:05
You could always double hash the password, which might just be the easiest way to prevent a hash table crack which typically can only crack hashes that store about 8 characters in length (from what i know). For an additional amount of security you can always append a random salt, although you will need to store the salt to succesfully recover the password for checking. The code could look like this:
<?php

function createSalt ($charno = 5) {

for ($i = 0; $i < $charno; $i++Wink {

$num = rand(48, 122); //This is roughly the ascii readable character range
$salt .= chr($num); //Convert the number to a real character

}

return $salt;

}

$randomsalt = createSalt();
$hash = md5(md5($string_to_hash.$randomsalt));

/* Now append this to your database, but remember to store the salt somewhere too, or else you wont be able to check the password later on */

?>

Easy as pie. Hope this helps.
Chris Ladd
05-Jun-2005 11:41
Using a hard coded salt will only prevent a dictionary attack on the raw database and only if the attacker hasn't gained access to the file the salt is stored in. The attacker could still use the php login site to run a dictionary attack, since the php would be adding the hard coded salt to the password, md5ing it, and checking if it matches. The only real way to prevent a dictionary attack is to not allow weak passwords. There is no shortcuts in real security.
oguh at gmx dot net
11-May-2005 11:06
Better use a random value for the salt and store it seperate in the database for every user.

So it is not possible to see if some users have the same password.
Jim Plush - jiminoc at gmail dot com
17-Mar-2005 01:45
Another handy trick is to use MD5 with a "salt". Which basically means appending another static string to your $password variable to help prevent against dictionary attacks.

Example:
config.php - KEEP THIS OUTSIDE THE WEBROOT
define("PHP_SALT", "iLov3pHp5");
----------------------------------------------

and when you add your database query you would do:
// storing password hash
$query = sprintf("INSERT INTO users(name,pwd) VALUES('%s','%s');",
addslashes($username), md5($password.PHP_SALT));

This way if a user's password is "DOG" it can't be guessed easily because their password gets saved to the DB as the MD5 version of "DOGiLov3pHp5". Last time I checked, that wasn't in the dictionary Smile
add a note add a note

Inyección de SQL> <Conexión con la Base de Datos Last updated: Fri, 22 Aug 2008
Volver arriba Ir abajo
https://aprendiendophp.activo.mx
 
Modelo de Almacenamiento Encriptado
Volver arriba 
Página 1 de 1.

Permisos de este foro:No puedes responder a temas en este foro.
aprendiendophp :: Tu primera categoría :: EMPEZAMOS CON PHP-
Cambiar a: