在源代码中处理用于auth的密码

A_E*_*ric 68 java security authentication

假设我试图从使用基本身份验证/基本证书的RESTful api中提取,那么在我的程序中存储该用户名和密码的最佳方法是什么?现在它只是以明文坐在那里.

UsernamePasswordCredentials creds = new UsernamePasswordCredentials("myName@myserver","myPassword1234");
Run Code Online (Sandbox Code Playgroud)

有没有什么方法可以做到这一点更安全?

谢谢

Xen*_*oRo 102

通过内外思维,以下是保护流程的一些步骤:


第一步,您应该将密码处理从更改Stringcharacter array.

这样做的原因是a String是一个immutable对象,因此即使对象设置为null,它的数据也不会立即被清除; 数据被设置为垃圾收集,这会带来安全问题,因为恶意程序String在清理之前可能会访问该(密码)数据.

这是为什么不推荐使用Swing的JPasswordFieldgetText()方法,以及为什么getPassword()使用字符数组的主要原因.


第二步是加密凭据,仅在身份验证过程中临时解密.

与第一步类似,这可确保您的漏洞时间尽可能小.

建议您的凭据不是硬编码的,而是以集中,可配置且易于维护的方式存储它们,例如配置或属性文件.

您应该在保存文件之前加密凭据,此外,您可以对文件本身应用第二次加密(对凭据进行2层加密,对其他文件内容进行1层加密).

注意,上面提到的两个加密过程中的每一个本身可以是多层的.作为概念性示例,每个加密可以是三重数据加密标准(AKA TDES和3DES)的单独应用.


在您的本地环境得到适当保护之后(但请记住,它永远不会"安全"!),第三步是通过使用TLS(传输层安全性)或SSL(安全套接字层)对您的传输过程应用基本保护.


第四步是应用其他保护方法.

例如,在您的"使用"编译中应用混淆技术,以避免(即使很快)您的安全措施的暴露,以防您的程序由Eve女士,Mallory先生或其他人(坏人)获得伙计们)并反编译.


更新1:

根据@ Damien.Bell的请求,这是一个涵盖第一步和第二步的例子:

    //These will be used as the source of the configuration file's stored attributes.
    private static final Map<String, String> COMMON_ATTRIBUTES = new HashMap<String, String>();
    private static final Map<String, char[]> SECURE_ATTRIBUTES = new HashMap<String, char[]>();
    //Ciphering (encryption and decryption) password/key.
    private static final char[] PASSWORD = "Unauthorized_Personel_Is_Unauthorized".toCharArray();
    //Cipher salt.
    private static final byte[] SALT = {
        (byte) 0xde, (byte) 0x33, (byte) 0x10, (byte) 0x12,
        (byte) 0xde, (byte) 0x33, (byte) 0x10, (byte) 0x12,};
    //Desktop dir:
    private static final File DESKTOP = new File(System.getProperty("user.home") + "/Desktop");
    //File names:
    private static final String NO_ENCRYPTION = "no_layers.txt";
    private static final String SINGLE_LAYER = "single_layer.txt";
    private static final String DOUBLE_LAYER = "double_layer.txt";

    /**
     * @param args the command line arguments
     */
    public static void main(String[] args) throws GeneralSecurityException, FileNotFoundException, IOException {
        //Set common attributes.
        COMMON_ATTRIBUTES.put("Gender", "Male");
        COMMON_ATTRIBUTES.put("Age", "21");
        COMMON_ATTRIBUTES.put("Name", "Hypot Hetical");
        COMMON_ATTRIBUTES.put("Nickname", "HH");

        /*
         * Set secure attributes.
         * NOTE: Ignore the use of Strings here, it's being used for convenience only.
         * In real implementations, JPasswordField.getPassword() would send the arrays directly.
         */
        SECURE_ATTRIBUTES.put("Username", "Hypothetical".toCharArray());
        SECURE_ATTRIBUTES.put("Password", "LetMePass_Word".toCharArray());

        /*
         * For demosntration purposes, I make the three encryption layer-levels I mention.
         * To leave no doubt the code works, I use real file IO.
         */
        //File without encryption.
        create_EncryptedFile(NO_ENCRYPTION, COMMON_ATTRIBUTES, SECURE_ATTRIBUTES, 0);
        //File with encryption to secure attributes only.
        create_EncryptedFile(SINGLE_LAYER, COMMON_ATTRIBUTES, SECURE_ATTRIBUTES, 1);
        //File completely encrypted, including re-encryption of secure attributes.
        create_EncryptedFile(DOUBLE_LAYER, COMMON_ATTRIBUTES, SECURE_ATTRIBUTES, 2);

        /*
         * Show contents of all three encryption levels, from file.
         */
        System.out.println("NO ENCRYPTION: \n" + readFile_NoDecryption(NO_ENCRYPTION) + "\n\n\n");
        System.out.println("SINGLE LAYER ENCRYPTION: \n" + readFile_NoDecryption(SINGLE_LAYER) + "\n\n\n");
        System.out.println("DOUBLE LAYER ENCRYPTION: \n" + readFile_NoDecryption(DOUBLE_LAYER) + "\n\n\n");

        /*
         * Decryption is demonstrated with the Double-Layer encryption file.
         */
        //Descrypt first layer. (file content) (REMEMBER: Layers are in reverse order from writing).
        String decryptedContent = readFile_ApplyDecryption(DOUBLE_LAYER);
        System.out.println("READ: [first layer decrypted]\n" + decryptedContent + "\n\n\n");
        //Decrypt second layer (secure data).
        for (String line : decryptedContent.split("\n")) {
            String[] pair = line.split(": ", 2);
            if (pair[0].equalsIgnoreCase("Username") || pair[0].equalsIgnoreCase("Password")) {
                System.out.println("Decrypted: " + pair[0] + ": " + decrypt(pair[1]));
            }
        }
    }

    private static String encrypt(byte[] property) throws GeneralSecurityException {
        SecretKeyFactory keyFactory = SecretKeyFactory.getInstance("PBEWithMD5AndDES");
        SecretKey key = keyFactory.generateSecret(new PBEKeySpec(PASSWORD));
        Cipher pbeCipher = Cipher.getInstance("PBEWithMD5AndDES");
        pbeCipher.init(Cipher.ENCRYPT_MODE, key, new PBEParameterSpec(SALT, 20));

        //Encrypt and save to temporary storage.
        String encrypted = Base64.encodeBytes(pbeCipher.doFinal(property));

        //Cleanup data-sources - Leave no traces behind.
        for (int i = 0; i < property.length; i++) {
            property[i] = 0;
        }
        property = null;
        System.gc();

        //Return encryption result.
        return encrypted;
    }

    private static String encrypt(char[] property) throws GeneralSecurityException {
        //Prepare and encrypt.
        byte[] bytes = new byte[property.length];
        for (int i = 0; i < property.length; i++) {
            bytes[i] = (byte) property[i];
        }
        String encrypted = encrypt(bytes);

        /*
         * Cleanup property here. (child data-source 'bytes' is cleaned inside 'encrypt(byte[])').
         * It's not being done because the sources are being used multiple times for the different layer samples.
         */
//      for (int i = 0; i < property.length; i++) { //cleanup allocated data.
//          property[i] = 0;
//      }
//      property = null; //de-allocate data (set for GC).
//      System.gc(); //Attempt triggering garbage-collection.

        return encrypted;
    }

    private static String encrypt(String property) throws GeneralSecurityException {
        String encrypted = encrypt(property.getBytes());
        /*
         * Strings can't really have their allocated data cleaned before CG,
         * that's why secure data should be handled with char[] or byte[].
         * Still, don't forget to set for GC, even for data of sesser importancy;
         * You are making everything safer still, and freeing up memory as bonus.
         */
        property = null;
        return encrypted;
    }

    private static String decrypt(String property) throws GeneralSecurityException, IOException {
        SecretKeyFactory keyFactory = SecretKeyFactory.getInstance("PBEWithMD5AndDES");
        SecretKey key = keyFactory.generateSecret(new PBEKeySpec(PASSWORD));
        Cipher pbeCipher = Cipher.getInstance("PBEWithMD5AndDES");
        pbeCipher.init(Cipher.DECRYPT_MODE, key, new PBEParameterSpec(SALT, 20));
        return new String(pbeCipher.doFinal(Base64.decode(property)));
    }

    private static void create_EncryptedFile(
                    String fileName,
                    Map<String, String> commonAttributes,
                    Map<String, char[]> secureAttributes,
                    int layers)
                    throws GeneralSecurityException, FileNotFoundException, IOException {
        StringBuilder sb = new StringBuilder();
        for (String k : commonAttributes.keySet()) {
            sb.append(k).append(": ").append(commonAttributes.get(k)).append(System.lineSeparator());
        }
        //First encryption layer. Encrypts secure attribute values only.
        for (String k : secureAttributes.keySet()) {
            String encryptedValue;
            if (layers >= 1) {
                encryptedValue = encrypt(secureAttributes.get(k));
            } else {
                encryptedValue = new String(secureAttributes.get(k));
            }
            sb.append(k).append(": ").append(encryptedValue).append(System.lineSeparator());
        }

        //Prepare file and file-writing process.
        File f = new File(DESKTOP, fileName);
        if (!f.getParentFile().exists()) {
            f.getParentFile().mkdirs();
        } else if (f.exists()) {
            f.delete();
        }
        BufferedWriter bw = new BufferedWriter(new FileWriter(f));
        //Second encryption layer. Encrypts whole file content including previously encrypted stuff.
        if (layers >= 2) {
            bw.append(encrypt(sb.toString().trim()));
        } else {
            bw.append(sb.toString().trim());
        }
        bw.flush();
        bw.close();
    }

    private static String readFile_NoDecryption(String fileName) throws FileNotFoundException, IOException, GeneralSecurityException {
        File f = new File(DESKTOP, fileName);
        BufferedReader br = new BufferedReader(new FileReader(f));
        StringBuilder sb = new StringBuilder();
        while (br.ready()) {
            sb.append(br.readLine()).append(System.lineSeparator());
        }
        return sb.toString();
    }

    private static String readFile_ApplyDecryption(String fileName) throws FileNotFoundException, IOException, GeneralSecurityException {
        File f = new File(DESKTOP, fileName);
        BufferedReader br = new BufferedReader(new FileReader(f));
        StringBuilder sb = new StringBuilder();
        while (br.ready()) {
            sb.append(br.readLine()).append(System.lineSeparator());
        }
        return decrypt(sb.toString());
    }
Run Code Online (Sandbox Code Playgroud)

一个完整的例子,解决每个保护步骤,远远超出我认为对这个问题合理的范围,因为它是关于"步骤是什么",而不是"如何应用它们".

这将远远超过我的答案(最后是抽样),而其他关于SO的问题已经针对这些步骤的"如何",更合适,并提供了更好的解释和抽样实施每个步骤.

  • `[*]` - @ Damien.Bell为了不让你的请求无人看管,我已经包含了一个涵盖第一步(〜)和第二步的例子.---至于为什么不是所有的步骤,好吧,正如你所看到的,你不能用一小段代码来抽样; 网络保护的一个例子甚至需要比本地范围更多,即使是部分伪编码.混淆也有很多种实现方法,虽然它在概念上很简单,但它应用于源代码本身的事实意味着它很难在样本中解释. (3认同)
  • 最后,在源代码上运行类似ProGuard的混淆工具.众所周知,Java字节代码易于反汇编和分析.混淆是你的安全蛋糕上的锦上添花,并且使得人们更难以对代码进行逆向工程并可能破坏你的安全措施.请参阅:http://proguard.sourceforge.net/index.html#manual/introduction.html (2认同)
  • 在我的源代码中包含所有解密和加密信息(包括盐),这如何更安全? (2认同)

Ath*_*way 7

如果您使用的是基本身份验证,则应将其与SSL结合使用,以避免在base64编码的纯文本中传递凭据.您不希望让嗅探数据包的人轻松获取您的凭据.此外,请勿在源代码中对您的凭据进行硬编码.使它们可配置.从配置文件中读取它们.您应该在将凭据存储到配置文件之前加密凭据,并且应用程序应在从配置文件中读取凭据后解密凭据.