Good security is vital to the health and success of any website. Unfortunately, many developers cut corners when it comes to security, either due to a lack of understanding or because implementation is too large of a hurdle. To make your Yii-based site as secure as possible, Yii has baked in several excellent and easy to use security features.
Good security is vital to the health and success of any application. Unfortunately, many developers cut corners when it comes to security, either due to a lack of understanding or because implementation is too much of a hurdle. To make your Yii powered application as secure as possible, Yii has included several excellent and easy to use security features.
Hashing and verifying passwords
Hashing and verifying passwords
-------------------------------
-------------------------------
Most developers know that passwords cannot be stored in plain text, but many developers believe it's still safe to hash passwords using `md5` or `sha1`. There was a time when those hashing algorithms were sufficient, but modern hardware makes it possible to break those hashes very quickly using a brute force attack.
Most developers know that passwords cannot be stored in plain text, but many developers believe it's still safe to hash passwords using `md5` or `sha1`. There was a time when using the aforementioned hashing algorithms was sufficient, but modern hardware makes it possible to reverse such hashes very quickly using brute force attacks.
In order to truly secure user passwords, even in the worst case scenario (your database is broken into), you need to use a hashing algorithm that is resistant to brute force attacks. The best current choice is `bcrypt`. In PHP, you can create a `bcrypt` hash using the [crypt function](http://php.net/manual/en/function.crypt.php). Because this function is not easy to use properly, Yii provides two helper functions to make securely generating and verifying hashes easier.
In order to provide increased security for user passwords, even in the worst case scenario (your application is breached), you need to use a hashing algorithm that is resilient against brute force attacks. The best current choice is `bcrypt`. In PHP, you can create a `bcrypt` hash using the [crypt function](http://php.net/manual/en/function.crypt.php). Yii provides two helper functions which make using `crypt` to securely generate and verify hashes easier.
When a user provides a password for the first time (e.g., upon registration), the password needs to be hashed:
When a user provides a password for the first time (e.g., upon registration), the password needs to be hashed:
The hash would then be associated with the corresponding model attribute, so that the hashed password will be stored in the database for later use.
The hash can then be associated with the corresponding model attribute, so it can be stored in the database for later use.
When a user attempts to log in, the submitted password must be verified against the previously hashed and stored password:
When user attempts to log in, the submitted log in password must be verified against the previously hashed and stored password:
```php
```php
use\yii\helpers;
use yii\helpers\Security;
if (Security::validatePassword($password, $hash)) {
if (Security::validatePassword($password, $hash)) {
// all good, logging user in
// all good, logging user in
} else {
} else {
...
@@ -29,49 +31,59 @@ if (Security::validatePassword($password, $hash)) {
...
@@ -29,49 +31,59 @@ if (Security::validatePassword($password, $hash)) {
}
}
```
```
Generating Pseudorandom data
Creating random data
-----------
-----------
Random data is useful in many cases. For example, when resetting a password via email you need to generate a token,
Pseudorandom data is useful in many situations. For example when resetting a password via email you need to generate a token, save it to the database, and send it via email to end user which in turn will allow them to prove ownership of that account. It is very important that this token be unique, else there is a possibility and attacker can predict the token's value and reset the user's password.
save it to database, and send it via email to end user, allowing him to prove that email is his. It is very
important that this token be truly unique, else there will be a possibility to predict the token's value and reset another user's
Yii security helper makes generating pseudorandom data simple:
password.
Yii security helper makes generating random data this simple:
Note that you need to have the `openssl` extension installed in order to generate cryptographically secure random data.
Encryption and decryption
Encryption and decryption
-------------------------
-------------------------
In order to encrypt data so only the person knowing a secret passphrase or having a secret key will be able to decrypt it.
Yii provides convenient helper functions that allow you to encrypt/decrypt data using a secret key. The data is passed through and encryption function so that only the person which has the secret key will be able to decrypt it.
For example, we need to store some information in our database but we need to make sure only user knowing a secret code
For example, we need to store some information in our database but we need to make sure only the user which has the secret key can view it (even if the application database is compromised):
can view it (even if database is leaked):
```php
```php
// $data and $secretWord are from the form
// $data and $secretKey are obtained from the form
There are situations in which you need to verify that your data hasn't been tampered with by a third party or even corrupted in some way. Yii provides an easy way to confirm data integrity in the form of two helper functions.
Prefix the data with a hash generated from the secret key and data
hashData()
```php
validateData()
// $secretKey our application or user secret, $genuineData obtained from a reliable source