Very detailed, but from what you said "steve" logs in, but Robert does not.
I believe Steve is the correct way the hashed passwords are supposed to work. The salt and hash are usually together it seems, but I'm not sure if Steve has a salt attached or not. At least this is how the command line hasher works http://shiro.apache.org/command-line-hasher.html It will then ask you to enter the password and then confirm it:Password to hash: Password to hash (confirm): When this command executes, it will print out the securely-salted-iterated-and-hashed password. For example:$shiro1$SHA-256$500000$eWpVX2tGX7WCP2J+jMCNqw==$it/NRclMOHrfOvhAEFZ0mxIZRdbcfqIBdwdwdDXW2dM= Take this value and place it as the password in the user definition line (followed by any optional roles) as defined in the INI Users Configuration documentation. For example:[users] ... user1 = $shiro1$SHA-256$500000$eWpVX2tGX7WCP2J+jMCNqw==$it/NRclMOHrfOvhAEFZ0mxIZRdbcfqIBdwdwdDXW2dM= You will also need to ensure that the implicit iniRealm uses a CredentialsMatcher that knows how to perform secure hashed password comparisons. So configure this in the [main] section as well:[main] ... passwordMatcher = org.apache.shiro.authc.credential.PasswordMatcher iniRealm.credentialsMatcher = $passwordMatcher ... Granted I believe there are ways to set the salt as another DB item, or even from another server I believe I read. I wish there was more I could do to help, I will have to try my code and see how it works or not. My buddy seemed to have everythign working when I helped him, so i'm not too sure. Date: Thu, 30 Oct 2014 14:32:56 -0400 Subject: Re: Configuring Shiro Programatically From: [email protected] To: [email protected] The salt is stored in the database. The salt is retrieved from the database. The salt is ignored when calculating the hash of the password. The check always fails. Here's the sequence that happens(note that this starts at the AuthenticatingRealm level):1. Starting in getAuthenticationInfo of AuthenticatingRealm, an AuthenticationInfo is looked up. This goes to getCachedAuthenticationInfo - this is null the first time, so this goes to doGetAuthenticationInfo2. doGetAuthentication info is abstract, so it is delegated to the JdbcRealmClass3. In doGetAuthenticationInfo of JdbcRealm, the salt is retrieved from the database and set in the SimpleAuthenticationInfo object that this method returns.4. The SimpleAuthenticationInfo is passed with the token to assertCredentialsMatch5. assertCredentialsMatch asks the CredentialsMatcher if the token is equal to the AuthenticationInfo6. The CredentialsMatcher in this case is a PasswordMatcher. The relevant method is doCredentialsMatch.7. The PasswordMatcher then asks the PasswordService(a DefaultPasswordService object) if the passwords match. However, DefaultPasswordService looks at the saved information, and attempts to figure out the correct hash format. 8. The discovered format is null, because there's no data in the hashed password.9. The password is hashed, but the salt data that was retrieved from the database is not used. The hashed password is not equal to the stored password. Login fails. At some point between steps 6 and 7 there is a bug, in that the DefaultPasswordService knows nothing about the salt that is retrieved from the database. The PasswordMatcher can pass information on the salt to the DefaultPasswordService, but it does not. This is because the HashingPasswordService does not have the capability to take in the salt on the password. For clarity, here's the database dump. User 'steve' can log in, user 'robert' cannot. username|password|password_saltrobert|ff72007e587a7be71ffa92b598fef97ec0de1a1354a5e241f60d1806c9cd0351|64df10ba steve|$shiro1$SHA-256$500000$ODjsYh0x1ASOx3gdXa3iGg==$d0AnmvEpA1fVfBZrUKs4u+lkVwNr1o1eBdg+rAgqRHE=| Steve's password is in the Shiro1Crypt format, which tells shiro what formula to use, the iteration times, the salt, and the hash. User robert's format has the hashed password in one database column, and the salt in the other database column(it is using the defaults of SHA-256 and 500,000 iterations). JdbcRealm explicitly allows this format for the salt/password. Of course, I could be fundamentally misunderstanding how these passwords are supposed to be stored in the database. I can store passwords in the Shiro1Crypt if needed, I was just surprised that the first way of storing the passwords didn't work. -Robert Middleton On Thu, Oct 30, 2014 at 1:13 PM, Konrad Zuse <[email protected]> wrote: Set the salt and stuff via java, and then retrieve with your shiro.ini info. Date: Thu, 30 Oct 2014 13:06:13 -0400 Subject: Re: Configuring Shiro Programatically From: [email protected] To: [email protected] What's the proper way to report a bug on this? There's the ASF Shiro JIRA, but it seems that it's not possible to report a bug in JIRA without having the correct permissions. -Robert Middleton On Thu, Oct 30, 2014 at 11:29 AM, Robert Middleton <[email protected]> wrote: The queries should all be done through the JdbcRealm class, that has the standard JDBC queries. I have figured out the problem though. It turns out that shiro is ignoring the salt when attempting to set the password up. Since I have two columns, one for the hashed password and one for the salt, it's correctly retrieving them but is not setting the salt when asking for the password to be checked. It works fine as long as the database column is in the $shiro1 format. -Robert Middleton On Wed, Oct 29, 2014 at 6:07 PM, Konrad Zuse <[email protected]> wrote: This is my code, granted I will say I have not personally tested it, but I helped another buddy finish his project so I believe this should work completely. I haven't tested it yet only because I was siill setting up my DB and I am finishing up other things now. I'm not 100% sure about the line "# privateSalt needs to be base64-encoded in shiro.ini but not in the Java code" as I got this from another source, but I'm not sure why one would be and one wouldn't, so hopefully someone else can answer that. # Hash Service Original values of PasswordServicehashService = org.apache.shiro.crypto.hash.DefaultHashServicehashService.hashIterations = 500,000hashService.hashAlgorithmName = SHA-256hashService.generatePublicSalt = true # privateSalt needs to be base64-encoded in shiro.ini but not in the Java code#Salt is randomly generated with the Secure Generator saltGenerator = org.apache.shiro.crypto.SecureRandomNumberGeneratorhashService.privateSalt = saltGenerator.nextBytes.toBase64 #PasswordMatcherpasswordMatcher = org.apache.shiro.authc.credential.PasswordMatcher #PasswordServicepasswordService = org.apache.shiro.authc.credential.DefaultPasswordServicepasswordService.hashService = $hashServicepasswordMatcher.passwordService = $passwordService #DataSource which is our Databaseds = ds.serverName = ds.port = ds.databaseName = ds.user = ds.password = jdbcRealm = org.apache.shiro.realm.jdbc.JdbcRealm jdbcRealm.permissionsLookupEnabled = true jdbcRealm.authenticationQuery = SELECT password FROM Company WHERE username = ? jdbcRealm.userRolesQuery = SELECT roles FROM Company WHERE username = ? jdbcRealm.permissionsQuery = SELECT permissions FROM Company WHERE role_name = ? jdbcRealm.credentialsMatcher = $passwordMatcher jdbcRealm.dataSource=$ds securityManager.realms = $jdbcRealm I'm assuming all of your queries and such are done within your SQLiteConfig config = new SQLiteConfig(); class? Is this your own class, or is this one of the predefined classes? From: [email protected] To: [email protected] Subject: RE: Configuring Shiro Programatically Date: Wed, 29 Oct 2014 17:54:38 -0400 Weird... It looks like there is an issue with the class loader, however why does it say "Unable to load class" then "Unabl;e to load clazz....???" Something is weird there. Date: Wed, 29 Oct 2014 17:40:39 -0400 Subject: Re: Configuring Shiro Programatically From: [email protected] To: [email protected] Oh, that makes a bit more sense now. I've used the PasswordService and PasswordManager now, but I'm still unable to authenticate. I turned up debugging some more, and now I get the following output:17:21:55.123 [SSHThread] TRACE org.apache.shiro.util.ClassUtils - Unable to load clazz named [ff72007e587a7be71ffa92b598fef97ec0de1a1354a5e241f60d1806c9cd0351] from class loader [sun.misc.Launcher$AppClassLoader@13cb1eb] 17:21:55.123 [SSHThread] TRACE org.apache.shiro.util.ClassUtils - Unable to load class named [ff72007e587a7be71ffa92b598fef97ec0de1a1354a5e241f60d1806c9cd0351] from the thread context ClassLoader. Trying the current ClassLoader... 17:21:55.124 [SSHThread] TRACE org.apache.shiro.util.ClassUtils - Unable to load clazz named [ff72007e587a7be71ffa92b598fef97ec0de1a1354a5e241f60d1806c9cd0351] from class loader [sun.misc.Launcher$AppClassLoader@13cb1eb] 17:21:55.124 [SSHThread] TRACE org.apache.shiro.util.ClassUtils - Unable to load class named [ff72007e587a7be71ffa92b598fef97ec0de1a1354a5e241f60d1806c9cd0351] from the current ClassLoader. Trying the system/application ClassLoader... 17:21:55.124 [SSHThread] TRACE org.apache.shiro.util.ClassUtils - Unable to load clazz named [ff72007e587a7be71ffa92b598fef97ec0de1a1354a5e241f60d1806c9cd0351] from class loader [sun.misc.Launcher$AppClassLoader@13cb1eb] The ff72... value is the hashed password, so shiro is reading from the database properly. However, the log messages indicate that it's trying to load a class with that name?? My database should be setup properly, with a table 'users' and columns 'password', 'password_salt', and 'username'. -Robert Middleton On Wed, Oct 29, 2014 at 2:35 PM, Konrad Zuse <[email protected]> wrote: Sorry, ignore my last reply, was in the middle of typing it and was goin g to finish it later since I didn't have time and clicked send... sorry all again >( You should, however, be using "passwordservice" and passwordmanager I don't have much time now, so I will reply again later with some code I have using it. check out this post though from Lez, who is the creator (at least I believe he is one of them, if not the only one). http://stackoverflow.com/questions/17048153/apache-shiro-using-hashing-credentials-can-not-make-login-successfully From: [email protected] To: [email protected] Subject: RE: Configuring Shiro Programatically Date: Wed, 29 Oct 2014 14:33:21 -0400 I don't think we used HashedCredentialsMatcher anymore, From: [email protected] Date: Wed, 29 Oct 2014 15:26:12 +0100 Subject: Re: Configuring Shiro Programatically To: [email protected] You're probably missing a LifecycleUtils.init(realm); Log lines come from AuthenticatingRealm most probably because JdbcRealm inherits those methods from AuthenticatingRealm. Typically loggers are initialized with the class declaring them. On Wed, Oct 29, 2014 at 3:06 PM, Robert Middleton <[email protected]> wrote: Hi, I have set up shiro programatically using the following code: SQLiteConfig config = new SQLiteConfig(); config.enforceForeignKeys( true ); HashedCredentialsMatcher cm = new HashedCredentialsMatcher( "SHA-256" ); cm.setHashIterations( 500000 ); JdbcRealm realm = new JdbcRealm(); org.sqlite.SQLiteDataSource ds = new org.sqlite.SQLiteDataSource( config ); ds.setUrl( "jdbc:sqlite:light.db" ); realm.setDataSource( ds ); realm.setCredentialsMatcher( cm ); realm.setSaltStyle( SaltStyle.COLUMN ); SecurityManager ss = new DefaultSecurityManager( realm ); SecurityUtils.setSecurityManager( ss ); However, when I try to authenticate a user, I can't log in. This worked find before when I used shiro.ini with no encryption on the passwords. The following debug information is printed out: 18:18:28.835 [SSHThread] DEBUG org.apache.shiro.realm.AuthenticatingRealm - Looked up AuthenticationInfo [robert] from doGetAuthenticationInfo 18:18:28.836 [SSHThread] DEBUG org.apache.shiro.realm.AuthenticatingRealm - AuthenticationInfo caching is disabled for info [robert]. Submitted token: [org.apache.shiro.authc.UsernamePasswordToken - robert, rememberMe=false]. 18:18:29.275 [SSHThread] DEBUG org.apache.shiro.authc.credential.SimpleCredentialsMatcher - Performing credentials equality check for tokenCredentials of type [org.apache.shiro.crypto.hash.SimpleHash and accountCredentials of type [org.apache.shiro.crypto.hash.SimpleHash] 18:18:29.276 [SSHThread] DEBUG org.apache.shiro.authc.credential.SimpleCredentialsMatcher - Both credentials arguments can be easily converted to byte arrays. Performing array equals comparison 18:18:29.277 [SSHThread] ERROR com.synexxus.gateway.connectors.SSHConnector - org.apache.shiro.authc.IncorrectCredentialsException: Submitted credentials for token [org.apache.shiro.authc.UsernamePasswordToken - robert, rememberMe=false] did not match the expected credentials. Since I setup the realm for the SecurityManager to be a JdbcRealm, I would expect that the log lines that come from org.apache.shiro.realm.AuthenticatingRealm would in fact come from org.apache.shiro.realm.jdbc.JdbcRealm. Why isn't this the case? -- Alessio Stalla | Software Architect M: +39 340 7824743 | T: +39 010 566441 | F: +39 010 8900455 [email protected] | www.manydesigns.com MANYDESIGNS s.r.l. Via G. D'Annunzio, 2/51 | 16121 Genova (GE) | Italy
