#26614: Use constant_time_compare() in checking session auth hash in login()
------------------------------------------------+------------------------
               Reporter:  Alex                  |          Owner:  nobody
                   Type:  Cleanup/optimization  |         Status:  new
              Component:  contrib.auth          |        Version:  master
               Severity:  Normal                |       Keywords:
           Triage Stage:  Accepted              |      Has patch:  0
    Needs documentation:  0                     |    Needs tests:  0
Patch needs improvement:  0                     |  Easy pickings:  0
                  UI/UX:  0                     |
------------------------------------------------+------------------------
 
[https://github.com/django/django/blob/104727030c52a6cd5e85fdcc64dd6cfc906fc241/django/contrib/auth/__init__.py#L103
 django.contrib.auth.login()] should use a constant time comparison so that
 an attacker is unable to gain information about the expected session hash.

 The implication seem to be that an attacker might be able to guess the
 salted hmac of the password, which should be pretty much worthless, and
 they would also have to guess the session ID, so this is more hardening
 than a security vulnerability.

--
Ticket URL: <https://code.djangoproject.com/ticket/26614>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.

-- 
You received this message because you are subscribed to the Google Groups 
"Django updates" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/django-updates/047.8282018ebce20d235b6f1b86341c770c%40djangoproject.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to