blob: dd62cb32b9d16bfa50f7c0039c183ff0030f0c81 [file] [log] [blame]
Georg Brandl116aa622007-08-15 14:28:22 +00001:mod:`crypt` --- Function to check Unix passwords
2=================================================
3
4.. module:: crypt
5 :platform: Unix
6 :synopsis: The crypt() function used to check Unix passwords.
Terry Jan Reedyfa089b92016-06-11 15:02:54 -04007
Georg Brandl116aa622007-08-15 14:28:22 +00008.. moduleauthor:: Steven D. Majewski <sdm7g@virginia.edu>
9.. sectionauthor:: Steven D. Majewski <sdm7g@virginia.edu>
10.. sectionauthor:: Peter Funk <pf@artcom-gmbh.de>
11
Terry Jan Reedyfa089b92016-06-11 15:02:54 -040012**Source code:** :source:`Lib/crypt.py`
Georg Brandl116aa622007-08-15 14:28:22 +000013
14.. index::
15 single: crypt(3)
16 pair: cipher; DES
17
Terry Jan Reedyfa089b92016-06-11 15:02:54 -040018--------------
19
Georg Brandl116aa622007-08-15 14:28:22 +000020This module implements an interface to the :manpage:`crypt(3)` routine, which is
21a one-way hash function based upon a modified DES algorithm; see the Unix man
Sean Reifscheidere2dfefb2011-02-22 10:55:44 +000022page for further details. Possible uses include storing hashed passwords
23so you can check passwords without storing the actual password, or attempting
24to crack Unix passwords with a dictionary.
Georg Brandl116aa622007-08-15 14:28:22 +000025
26.. index:: single: crypt(3)
27
28Notice that the behavior of this module depends on the actual implementation of
29the :manpage:`crypt(3)` routine in the running system. Therefore, any
30extensions available on the current implementation will also be available on
31this module.
32
Sean Reifscheidere2dfefb2011-02-22 10:55:44 +000033Hashing Methods
34---------------
Georg Brandl116aa622007-08-15 14:28:22 +000035
Éric Araujof2156312011-05-29 03:27:48 +020036.. versionadded:: 3.3
37
Sean Reifscheidere2dfefb2011-02-22 10:55:44 +000038The :mod:`crypt` module defines the list of hashing methods (not all methods
39are available on all platforms):
40
41.. data:: METHOD_SHA512
42
43 A Modular Crypt Format method with 16 character salt and 86 character
Serhiy Storchakaeab3ff72017-10-24 19:36:17 +030044 hash based on the SHA-512 hash function. This is the strongest method.
Sean Reifscheidere2dfefb2011-02-22 10:55:44 +000045
Sean Reifscheidere2dfefb2011-02-22 10:55:44 +000046.. data:: METHOD_SHA256
47
48 Another Modular Crypt Format method with 16 character salt and 43
Serhiy Storchakaeab3ff72017-10-24 19:36:17 +030049 character hash based on the SHA-256 hash function.
50
51.. data:: METHOD_BLOWFISH
52
53 Another Modular Crypt Format method with 22 character salt and 31
54 character hash based on the Blowfish cipher.
55
56 .. versionadded:: 3.7
Sean Reifscheidere2dfefb2011-02-22 10:55:44 +000057
Sean Reifscheidere2dfefb2011-02-22 10:55:44 +000058.. data:: METHOD_MD5
59
60 Another Modular Crypt Format method with 8 character salt and 22
Serhiy Storchakaeab3ff72017-10-24 19:36:17 +030061 character hash based on the MD5 hash function.
Sean Reifscheidere2dfefb2011-02-22 10:55:44 +000062
Sean Reifscheidere2dfefb2011-02-22 10:55:44 +000063.. data:: METHOD_CRYPT
64
65 The traditional method with a 2 character salt and 13 characters of
66 hash. This is the weakest method.
67
Brett Cannondaa57992011-02-22 21:48:06 +000068
69Module Attributes
70-----------------
71
Éric Araujof2156312011-05-29 03:27:48 +020072.. versionadded:: 3.3
Brett Cannondaa57992011-02-22 21:48:06 +000073
74.. attribute:: methods
75
76 A list of available password hashing algorithms, as
77 ``crypt.METHOD_*`` objects. This list is sorted from strongest to
Victor Stinner6661d882015-10-02 23:00:39 +020078 weakest.
Brett Cannondaa57992011-02-22 21:48:06 +000079
Brett Cannondaa57992011-02-22 21:48:06 +000080
Sean Reifscheidere2dfefb2011-02-22 10:55:44 +000081Module Functions
82----------------
83
84The :mod:`crypt` module defines the following functions:
85
86.. function:: crypt(word, salt=None)
Georg Brandl116aa622007-08-15 14:28:22 +000087
88 *word* will usually be a user's password as typed at a prompt or in a graphical
Sean Reifscheidere2dfefb2011-02-22 10:55:44 +000089 interface. The optional *salt* is either a string as returned from
90 :func:`mksalt`, one of the ``crypt.METHOD_*`` values (though not all
91 may be available on all platforms), or a full encrypted password
92 including salt, as returned by this function. If *salt* is not
93 provided, the strongest method will be used (as returned by
94 :func:`methods`.
95
96 Checking a password is usually done by passing the plain-text password
97 as *word* and the full results of a previous :func:`crypt` call,
98 which should be the same as the results of this call.
99
100 *salt* (either a random 2 or 16 character string, possibly prefixed with
101 ``$digit$`` to indicate the method) which will be used to perturb the
102 encryption algorithm. The characters in *salt* must be in the set
103 ``[./a-zA-Z0-9]``, with the exception of Modular Crypt Format which
104 prefixes a ``$digit$``.
105
106 Returns the hashed password as a string, which will be composed of
107 characters from the same alphabet as the salt.
Georg Brandl116aa622007-08-15 14:28:22 +0000108
109 .. index:: single: crypt(3)
110
111 Since a few :manpage:`crypt(3)` extensions allow different values, with
112 different sizes in the *salt*, it is recommended to use the full crypted
113 password as salt when checking for a password.
114
Éric Araujof2156312011-05-29 03:27:48 +0200115 .. versionchanged:: 3.3
116 Accept ``crypt.METHOD_*`` values in addition to strings for *salt*.
Sean Reifscheidere2dfefb2011-02-22 10:55:44 +0000117
Sean Reifscheidere2dfefb2011-02-22 10:55:44 +0000118
Serhiy Storchakacede8c92017-11-16 13:22:51 +0200119.. function:: mksalt(method=None, *, rounds=None)
Sean Reifscheidere2dfefb2011-02-22 10:55:44 +0000120
121 Return a randomly generated salt of the specified method. If no
122 *method* is given, the strongest method available as returned by
123 :func:`methods` is used.
124
Serhiy Storchakaeab3ff72017-10-24 19:36:17 +0300125 The return value is a string suitable for passing as the *salt* argument
126 to :func:`crypt`.
127
Serhiy Storchakacede8c92017-11-16 13:22:51 +0200128 *rounds* specifies the number of rounds for ``METHOD_SHA256``,
129 ``METHOD_SHA512`` and ``METHOD_BLOWFISH``.
130 For ``METHOD_SHA256`` and ``METHOD_SHA512`` it must be an integer between
131 ``1000`` and ``999_999_999``, the default is ``5000``. For
132 ``METHOD_BLOWFISH`` it must be a power of two between ``16`` (2\ :sup:`4`)
133 and ``2_147_483_648`` (2\ :sup:`31`), the default is ``4096``
134 (2\ :sup:`12`).
Sean Reifscheidere2dfefb2011-02-22 10:55:44 +0000135
Éric Araujof2156312011-05-29 03:27:48 +0200136 .. versionadded:: 3.3
Sean Reifscheidere2dfefb2011-02-22 10:55:44 +0000137
Serhiy Storchakaeab3ff72017-10-24 19:36:17 +0300138 .. versionchanged:: 3.7
Serhiy Storchakacede8c92017-11-16 13:22:51 +0200139 Added the *rounds* parameter.
Serhiy Storchakaeab3ff72017-10-24 19:36:17 +0300140
141
Sean Reifscheidere2dfefb2011-02-22 10:55:44 +0000142Examples
143--------
144
Nick Coghlan74cca702012-09-28 18:50:38 +0530145A simple example illustrating typical use (a constant-time comparison
146operation is needed to limit exposure to timing attacks.
147:func:`hmac.compare_digest` is suitable for this purpose)::
Georg Brandl116aa622007-08-15 14:28:22 +0000148
Éric Araujobc577892011-05-29 03:24:45 +0200149 import pwd
150 import crypt
151 import getpass
Nick Coghlan74cca702012-09-28 18:50:38 +0530152 from hmac import compare_digest as compare_hash
Georg Brandl116aa622007-08-15 14:28:22 +0000153
Georg Brandl116aa622007-08-15 14:28:22 +0000154 def login():
Éric Araujobc577892011-05-29 03:24:45 +0200155 username = input('Python login: ')
Georg Brandl116aa622007-08-15 14:28:22 +0000156 cryptedpasswd = pwd.getpwnam(username)[1]
157 if cryptedpasswd:
Georg Brandl48310cd2009-01-03 21:18:54 +0000158 if cryptedpasswd == 'x' or cryptedpasswd == '*':
Éric Araujobc577892011-05-29 03:24:45 +0200159 raise ValueError('no support for shadow passwords')
Georg Brandl116aa622007-08-15 14:28:22 +0000160 cleartext = getpass.getpass()
Nick Coghlan74cca702012-09-28 18:50:38 +0530161 return compare_hash(crypt.crypt(cleartext, cryptedpasswd), cryptedpasswd)
Georg Brandl116aa622007-08-15 14:28:22 +0000162 else:
Éric Araujobc577892011-05-29 03:24:45 +0200163 return True
Georg Brandl116aa622007-08-15 14:28:22 +0000164
Sean Reifscheidere2dfefb2011-02-22 10:55:44 +0000165To generate a hash of a password using the strongest available method and
166check it against the original::
167
168 import crypt
Nick Coghlan74cca702012-09-28 18:50:38 +0530169 from hmac import compare_digest as compare_hash
Sean Reifscheidere2dfefb2011-02-22 10:55:44 +0000170
171 hashed = crypt.crypt(plaintext)
Nick Coghlan74cca702012-09-28 18:50:38 +0530172 if not compare_hash(hashed, crypt.crypt(plaintext, hashed)):
Serhiy Storchakadba90392016-05-10 12:01:23 +0300173 raise ValueError("hashed version doesn't validate against original")