Skip to content

Conversation

codingjoe
Copy link
Owner

Since the password was set to None, the session hash was always
identical and predictable for an attacker. A new random salt is
added to replace the password which served this funciton before.

Should the new session salt is set be default to a rendom value.
Should the salt be set to None for some reason, the
get_session_auth_hash method will raise a ValueError.

The password field is now removed from the user model. It will
raise a FieldDoesNotExist error, should the attribute be
access further preventing similar security issues.

@codecov
Copy link

codecov bot commented May 28, 2019

Codecov Report

Merging #1 into master will not change coverage.
The diff coverage is 100%.

Impacted file tree graph

@@          Coverage Diff          @@
##           master     #1   +/-   ##
=====================================
  Coverage     100%   100%           
=====================================
  Files          11     12    +1     
  Lines         188    201   +13     
=====================================
+ Hits          188    201   +13
Impacted Files Coverage Δ
...rib/user/migrations/0002_emailuser_session_salt.py 100% <100%> (ø)
mailauth/contrib/user/models.py 100% <100%> (ø) ⬆️

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update f1e07a1...de1d0bf. Read the comment docs.

Since the password was set to None, the session hash was always
identical and predictable for an attacker. A new random salt is
added to replace the password which served this funciton before.

Should the new session salt is set be default to a rendom value.
Should the salt be set to None for some reason, the
`get_session_auth_hash` method will raise a `ValueError`.

The password field is now removed from the user model. It will
raise a `FieldDoesNotExist` error, should the attribute be
access further preventing similar security issues.
@codingjoe codingjoe merged commit 21d608c into master May 28, 2019
@codingjoe codingjoe deleted the session-key branch May 28, 2019 12:02
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant