Common stuff for all my devices' web server pages: css, login, log, ipv4, ipv6, firmware update, clock, reset info etc.

Dependents:   oldheating gps motorhome heating

Security

A password has to be set whenever there has been a software reset. Resets following faults or power on do not require a new password as the hash is restored from the RTC GPREG register.

The password is not saved on the device; instead a 32 bit hash of the password is saved. It would take 2^31 attempts to brute force the password: this could be done in under a month if an attempt were possible every millisecond. To prevent this a 200 ms delay is introduced in the reply to the login form, that gives a more reasonable 13 years to brute force the password.

Once the password is accepted a random session id is created. This is 36 bit to give six base 64 characters but without an extra delay. If an attempt could be made every ms then this would still take over a year to brute force.

The most likely attack would to use a dictionary with, say, 10 million entries against the password which would still take 20 days to do.

Committer:
andrewboyson
Date:
Wed Jul 31 15:09:15 2019 +0000
Revision:
127:bd6dd135009d
Parent:
118:53430a2a2595
Amalgamated Reply into Poll function

Who changed what in which revision?

UserRevisionLine numberNew contents of line
andrewboyson 110:8ab752842d25 1
andrewboyson 110:8ab752842d25 2 #include "web-pages-base.h"
andrewboyson 110:8ab752842d25 3 #include "web-login.h"
andrewboyson 110:8ab752842d25 4 #include "http.h"
andrewboyson 118:53430a2a2595 5 #include "reset.h"
andrewboyson 110:8ab752842d25 6
andrewboyson 110:8ab752842d25 7 int WebLoginOriginalToDo = 0;
andrewboyson 110:8ab752842d25 8
andrewboyson 110:8ab752842d25 9 bool WebLoginCookiesContainValidSessionId(char* pCookies)
andrewboyson 110:8ab752842d25 10 {
andrewboyson 110:8ab752842d25 11 if (!WebLoginSessionIdIsSet()) return false;
andrewboyson 110:8ab752842d25 12
andrewboyson 110:8ab752842d25 13 while (pCookies)
andrewboyson 110:8ab752842d25 14 {
andrewboyson 110:8ab752842d25 15 char* pName;
andrewboyson 110:8ab752842d25 16 char* pValue;
andrewboyson 110:8ab752842d25 17 pCookies = HttpCookiesSplit(pCookies, &pName, &pValue);
andrewboyson 110:8ab752842d25 18
andrewboyson 110:8ab752842d25 19 if (HttpSameStr(pName, WebLoginSessionNameGet())) //HttpSameStr handles NULLs correctly
andrewboyson 110:8ab752842d25 20 {
andrewboyson 110:8ab752842d25 21 if (HttpSameStr(pValue, WebLoginSessionIdGet())) return true;
andrewboyson 110:8ab752842d25 22 }
andrewboyson 110:8ab752842d25 23 }
andrewboyson 110:8ab752842d25 24 return false;
andrewboyson 110:8ab752842d25 25 }
andrewboyson 114:900e33dfa460 26 void WebLoginForceNewPassword()
andrewboyson 114:900e33dfa460 27 {
andrewboyson 114:900e33dfa460 28 WebLoginSessionIdReset();
andrewboyson 114:900e33dfa460 29 WebLoginPasswordReset();
andrewboyson 114:900e33dfa460 30 }
andrewboyson 110:8ab752842d25 31 void WebLoginInit()
andrewboyson 110:8ab752842d25 32 {
andrewboyson 118:53430a2a2595 33 if (!ResetWasPushButton()) WebLoginPasswordRestore();
andrewboyson 110:8ab752842d25 34 WebLoginSessionNameCreate();
andrewboyson 110:8ab752842d25 35 }