# Create a simple authentication system *an alternative to the hopelessly boring `hello world` examples for an introduction to git* Start creating a script called `auth.py` ### Expected usage: - run the script - the script asks for username and password - if the user is known and password is correct ➔ print "Successfully authenticated!" - if the user is known and password is wrong ➔ print "Wrong password!" - if the user is not known ➔ print "Wrong username!" - if the script is called with one argument, add a new user using the argument as a username - if a user has been added ➔ store the updated database to disk ### Basic API: - a function `get_credentials` that asks for username and password - a function `authenticate` that checks if user is in the password database and that the password is correct - a function `add_user` to add a new user with its password to the database - a function `read_pwdb` to read the password database from disk - a function `write_pwdb` to write the password database to disk Suggestions: - the database can be a simple dictionary `{username: password}` - the database can be serialized to disk with [`json`](https://docs.python.org/3/library/json.html) ### Later, think about the following problems: - we are leaking valid usernames ➔ return a generic error if username does not exist or password is wrong - [password *hashing*](https://en.wikipedia.org/wiki/Cryptographic_hash_function) ➔ do not store passwords in clear text (database could be stolen, admins are nosy). Solution: Do not store passwords at all but only their hashes (database could be stolen) - [password *salting*](https://en.wikipedia.org/wiki/Salt_%28cryptography%29) ➔ different users with same passwords should not have same hash ⟶ cracking one does not crack all: mitigates dictionary attacks, see below Addition to the basic API: - a function `pwhash` that given a password and a salt returns a hash - a function `get_salt` that returns a unique salt ### Try to crack it! (Advanced) - can you guess the [*hash collision*](https://en.wikipedia.org/wiki/Collision_attack) risk for the proposed solution? - try first a [*brute force*](https://en.wikipedia.org/wiki/Brute-force_attack) attack: is it feasible? - try a [*dictionary*](https://en.wikipedia.org/wiki/Dictionary_attack) attack (you can use this list of [probable passwords](https://github.com/danielmiessler/SecLists/tree/master/Passwords)): is it feasible? - think about [*lookup tables*](https://en.wikipedia.org/wiki/Lookup_table) and [*rainbow tables*](https://en.wikipedia.org/wiki/Rainbow_table) attacks - what are the trade-offs of the different attacks? ### Notes To make it for real: - insecure temporary file ([symlink race](https://en.wikipedia.org/wiki/Symlink_race) attack) ⟶ [`tempfile`](https://docs.python.org/3/library/tempfile.html) and its context managers - better way of generating passwords or random tokens: the [`secrets`](https://docs.python.org/3/library/secrets.html) module - cracking a password database is a form of art, see for example the [John the Ripper](http://www.openwall.com/john/) password cracker, or [Hashcat](https://hashcat.net/hashcat/) or [Brutus](https://www.darknet.org.uk/2006/09/brutus-password-cracker-download-brutus-aet2zip-aet2/)