728x90
방법 1. parameter만 바꾸기 (추천)
WebSecurityBeanFactory.java
import com.google.common.base.Charsets; import com.google.common.hash.Hashing;
import org.springframework.beans.factory.annotation.Value;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
import org.springframework.security.crypto.password.DelegatingPasswordEncoder;
import org.springframework.security.crypto.password.PasswordEncoder;
import org.springframework.security.crypto.password.Pbkdf2PasswordEncoder;
@Configuration
public class WebSecurityBeanFactory {
private String passwordSecret = "SECRET_KEY";
@Bean
public PasswordEncoder passwordEncoder() {
// encoding 기본형
String idForEncode = "pbkdf2";
Map<String, PasswordEncoder> encoders = new HashMap<>();
// parameter - 시크릿키, iteration(기본: 185000, 숫자가 낮을 수록 빨라짐), 해쉬 길이 - 기본: 256
encoders.put("pbkdf2", new Pbkdf2PasswordEncoder(passwordSecret, 1, 256));
return new DelegatingPasswordEncoder(idForEncode, encoders);
}
}
방법 2. 설정 새로 만들기
CustomPbkdf2PasswordEncoder.java
DEFAULT_ITERATIONS 185000 ==> 1 (낮을 수록 속도 빨라짐)
import java.security.GeneralSecurityException;
import java.security.MessageDigest;
import java.security.NoSuchAlgorithmException;
import java.util.Base64;
import javax.crypto.SecretKeyFactory;
import javax.crypto.spec.PBEKeySpec;
import org.springframework.security.crypto.codec.Hex;
import org.springframework.security.crypto.codec.Utf8;
import org.springframework.security.crypto.keygen.BytesKeyGenerator;
import org.springframework.security.crypto.keygen.KeyGenerators;
import org.springframework.security.crypto.password.PasswordEncoder;
import static org.springframework.security.crypto.util.EncodingUtils.concatenate;
import static org.springframework.security.crypto.util.EncodingUtils.subArray;
/**
* A {@code PasswordEncoder} implementation that uses PBKDF2 with a configurable number of
* iterations and a random 8-byte random salt value.
* <p>
* The width of the output hash can also be configured.
* <p>
* The algorithm is invoked on the concatenated bytes of the salt, secret and password.
*
* @author me
* @author me
* @since 4.1
*/
public class CustomPbkdf2PasswordEncoder implements PasswordEncoder {
private static final int DEFAULT_HASH_WIDTH = 256;
// private static final int DEFAULT_ITERATIONS = 185000;
// custom: change iteration (딜레이 변경: 1초--> 딜레이 없음)
private static final int DEFAULT_ITERATIONS = 1;
private final BytesKeyGenerator saltGenerator = KeyGenerators.secureRandom();
private final byte[] secret;
private final int hashWidth;
private final int iterations;
private String algorithm = SecretKeyFactoryAlgorithm.PBKDF2WithHmacSHA1.name();
private boolean encodeHashAsBase64;
/**
* Constructs a PBKDF2 password encoder with no additional secret value. There will be
* {@value DEFAULT_ITERATIONS} iterations and a hash width of {@value DEFAULT_HASH_WIDTH}. The default is based upon aiming for .5
* seconds to validate the password when this class was added.. Users should tune
* password verification to their own systems.
*/
public CustomPbkdf2PasswordEncoder() {
this("");
}
/**
* Constructs a standard password encoder with a secret value which is also included
* in the password hash. There will be {@value DEFAULT_ITERATIONS} iterations and a hash width of {@value DEFAULT_HASH_WIDTH}.
*
* @param secret the secret key used in the encoding process (should not be shared)
*/
public CustomPbkdf2PasswordEncoder(CharSequence secret) {
this(secret, DEFAULT_ITERATIONS, DEFAULT_HASH_WIDTH);
}
/**
* Constructs a standard password encoder with a secret value as well as iterations
* and hash.
*
* @param secret the secret
* @param iterations the number of iterations. Users should aim for taking about .5
* seconds on their own system.
* @param hashWidth the size of the hash
*/
public CustomPbkdf2PasswordEncoder(CharSequence secret, int iterations, int hashWidth) {
this.secret = Utf8.encode(secret);
this.iterations = iterations;
this.hashWidth = hashWidth;
}
/**
* Sets the algorithm to use. See
* <a href="https://docs.oracle.com/javase/8/docs/technotes/guides/security/StandardNames.html#SecretKeyFactory">SecretKeyFactory Algorithms</a>
* @param secretKeyFactoryAlgorithm the algorithm to use (i.e.
* {@code SecretKeyFactoryAlgorithm.PBKDF2WithHmacSHA1},
* {@code SecretKeyFactoryAlgorithm.PBKDF2WithHmacSHA256},
* {@code SecretKeyFactoryAlgorithm.PBKDF2WithHmacSHA512})
* @since 5.0
*/
public void setAlgorithm(SecretKeyFactoryAlgorithm secretKeyFactoryAlgorithm) {
if (secretKeyFactoryAlgorithm == null) {
throw new IllegalArgumentException("secretKeyFactoryAlgorithm cannot be null");
}
String algorithmName = secretKeyFactoryAlgorithm.name();
try {
SecretKeyFactory.getInstance(algorithmName);
}
catch (NoSuchAlgorithmException e) {
throw new IllegalArgumentException("Invalid algorithm '" + algorithmName + "'.", e);
}
this.algorithm = algorithmName;
}
/**
* Sets if the resulting hash should be encoded as Base64. The default is false which
* means it will be encoded in Hex.
* @param encodeHashAsBase64 true if encode as Base64, false if should use Hex
* (default)
*/
public void setEncodeHashAsBase64(boolean encodeHashAsBase64) {
this.encodeHashAsBase64 = encodeHashAsBase64;
}
@Override
public String encode(CharSequence rawPassword) {
byte[] salt = this.saltGenerator.generateKey();
byte[] encoded = encode(rawPassword, salt);
return encode(encoded);
}
private String encode(byte[] bytes) {
if (this.encodeHashAsBase64) {
return Base64.getEncoder().encodeToString(bytes);
}
return String.valueOf(Hex.encode(bytes));
}
@Override
public boolean matches(CharSequence rawPassword, String encodedPassword) {
byte[] digested = decode(encodedPassword);
byte[] salt = subArray(digested, 0, this.saltGenerator.getKeyLength());
return MessageDigest.isEqual(digested, encode(rawPassword, salt));
}
private byte[] decode(String encodedBytes) {
if (this.encodeHashAsBase64) {
return Base64.getDecoder().decode(encodedBytes);
}
return Hex.decode(encodedBytes);
}
private byte[] encode(CharSequence rawPassword, byte[] salt) {
try {
PBEKeySpec spec = new PBEKeySpec(rawPassword.toString().toCharArray(),
concatenate(salt, this.secret), this.iterations, this.hashWidth);
SecretKeyFactory skf = SecretKeyFactory.getInstance(this.algorithm);
return concatenate(salt, skf.generateSecret(spec).getEncoded());
}
catch (GeneralSecurityException e) {
throw new IllegalStateException("Could not create hash", e);
}
}
/**
* The Algorithm used for creating the {@link SecretKeyFactory}
*
* @since 5.0
*/
public enum SecretKeyFactoryAlgorithm {
PBKDF2WithHmacSHA1,
PBKDF2WithHmacSHA256,
PBKDF2WithHmacSHA512
}
}
WebSecurityBeanFactory.java
import com.google.common.base.Charsets;
import com.google.common.hash.Hashing;
import org.springframework.beans.factory.annotation.Value;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
import org.springframework.security.crypto.password.DelegatingPasswordEncoder;
import org.springframework.security.crypto.password.PasswordEncoder;
@Configuration
public class WebSecurityBeanFactory {
private String passwordSecret = "SECRET_KEY";
@Bean
public PasswordEncoder passwordEncoder() {
Map<String, PasswordEncoder> encoders = new HashMap<>();
// encoding 기본형
String idForEncode = "pbkdf2";
encoders.put("pbkdf2", new CustomPbkdf2PasswordEncoder(passwordSecret));
return new DelegatingPasswordEncoder(idForEncode, encoders);
}
728x90
'개발 > java,spring,springboot' 카테고리의 다른 글
Apache http request 응용(+Springboot) (0) | 2021.04.22 |
---|---|
org.springframework.web.HttpMediaTypeNotSupportedException: Content type 'text/plain;charset=UTF-8' not supported (0) | 2021.04.22 |
spring boot query dsl (data source 여러개 설정) (1) | 2021.04.07 |
Spring boot jpa datasource 여러 개 설정(multiple datasource) (2) | 2021.04.07 |
Spring scheduling + cron (0) | 2021.04.07 |
댓글