Upgrade password hashing from MD5 to bcrypt #152
Labels
No labels
Blocked
Duplicate
MoSCoW/Could Have
MoSCoW/Must Have
MoSCoW/Should Have
Points/1
Points/13
Points/2
Points/21
Points/3
Points/5
Points/8
Priority/Backlog
Priority/Critical
Priority/High
Priority/Low
Priority/Medium
State/Completed
State/In progress
State/In review
State/Paused
State/Unverified
State/Verified
State/Wont Do
Type/Bug
Type/Epic
Type/Feature
Type/Legendary
Type/Task
Type/Testing
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Blocks
#151 Epic: Security Hardening — Upgrade Password Hashing
aethyr/Aethyr
Reference: aethyr/Aethyr#152
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Metadata
fix(security): upgrade password hashing from MD5 to bcryptfeature/m1-bcrypt-passwordsBackground and Context
Player passwords are stored as MD5 hex digests in GDBM (
storage/passwords) and ESpassword_hashfields. MD5 is cryptographically broken — rainbow tables make reversal trivial. The fix uses bcrypt which includes a per-password salt and configurable work factor. A transparent upgrade mechanism detects MD5 hashes (32-char hex strings) and re-hashes them with bcrypt on successful login.Current Behavior
StorageMachine#save_playerstoresDigest::MD5.new.update(password).to_s.StorageMachine#check_passwordcompares MD5 hashes. ES events store MD5 hashes inpassword_hashfields.Expected Behavior
New passwords are stored as bcrypt hashes. On login, if the stored hash is a 32-character hex string (MD5 format), verify with MD5 first, then re-hash with bcrypt and update the store. ES events emit bcrypt hashes.
Acceptance Criteria
StorageMachine#save_playerstores bcrypt hashesStorageMachine#set_passwordstores bcrypt hashesStorageMachine#check_passwordverifies against bcrypt; transparent MD5 upgrade on matchbin/aethyr_setuppassword change uses bcryptbcryptgem added toaethyr.gemspecruntime dependenciesSubtasks
bcryptgem toaethyr.gemspecruntime dependenciesPasswordServiceutility module withhash_password(plain)andverify_password(plain, stored)methodsverify_password: 32-char hex = MD5 legacy,$2a$/$2b$prefix = bcryptStorageMachine#save_playerto usePasswordServiceStorageMachine#set_passwordto usePasswordServiceStorageMachine#check_passwordto usePasswordServicewith transparent upgradebin/aethyr_setuppassword change to usePasswordServiceset_passwordaethyr_setuppassword changebundle exec rake unit, fix any failurestests/integration/verifying player login with legacy MD5 password transparently upgrades to bcrypt.bundle exec rake unit_profileand verify no performance regressions.bundle exec rake unit. If coverage is <97% then review the current unit test coverage report atbuild/tests/unit/coverage/and use it to write new Cucumber based unit tests to improve code coverage. Specifically, write Cucumber/Gherkin style unit tests that are descriptively named and specifically improve coverage on whichever file has the most uncovered lines by writing tests that will target the uncovered lines in the report. Once that is done rerunbundle exec rake unitto verify all tests pass and coverage is above >=97%. Only mark this as complete once coverage is >=97%, if not repeat this task as many times as is needed until coverage reaches >=97%.bundle exec rake(default task: unit tests with coverage) andbundle exec rake integration, fix any errors if needed ensuring both pass across entire code base, do not ignore any failure even if it seems unrelated to this commit, fix it.Definition of Done
This issue is complete when:
master, reviewed, and merged before this issue is marked done.