tarikfp / secure-passwords

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Secure Passwords App

Demonstration Video

https://www.youtube.com/watch?v=Y0eGR2lwuTE

Direct Link

Introduction

This is MERN app. MERN stands for MongoDB, Express, React, Node.

In order to use the app, first user needs to register to the system. While registering, user needs to provide name, surname, email and password.

Secure Your Passwords

Register

In register, user's password will be saved to mongodb. Not as a plain text, but as using aes-256-ctr algorithm and crypto module of nodejs. User's plain password will be encrypted using crypto.createCipheriv function. In the code below 16 bytes encryption used with aes-256-ctr.


const crypto = require("crypto");
const config = require("config");
const secret = process.env.CRYPTO_SECRET || config.get("secret.crypto");
const algorithm = "aes-256-ctr";
const iv = crypto.randomBytes(16);

const encrypt = (text) => {
  const cipher = crypto.createCipheriv(algorithm, secret, iv);
  const encrypted = Buffer.concat([cipher.update(text), cipher.final()]);
  return {
    iv: iv.toString("hex"),
    password: encrypted.toString("hex"),
  };
};

An example of registered user in mongodb document is showned below. As it can be realized, encryption function return values which are iv (initialization vector) and password are saved in mongoose document as well as user's other fields.

image


router.post(
  "/register",
  [
    check("name", "Name is required").not().isEmpty(),
    check("surname", "Surname is required").not().isEmpty(),
    check("email", "Please provide valid e-mail").isEmail(),
    check("password", "Password is required").not().isEmpty(),
  ],
  async (req, res) => {
    try {
      const errors = validationResult(req);
      if (!errors.isEmpty()) {
        return res.status(400).json({ errors: errors.array() });
      }
      const { name, surname, email, password } = req.body;
      // Check if user already exists with the given emai
      let user = await User.findOne({ email });
      if (user) {
        return res
          .status(400)
          .json({ errors: [{ msg: "User Already Exists With That E-Mail" }] });
      }
      const hashedData = encrypt(password);
      user = new User({
        name,
        surname,
        email,
        password: hashedData.password,
        iv: hashedData.iv,
      });
      await user.save();
      return res.status(200).send();
    } catch (err) {
      return res.status(500).send();
    }
  }
);

The code section below corresponds to user register endpoint in our express api. I used express-validator in order to check all fields are valid and not empty. If any of them fails we send 400 bad request in order to block registering.

const errors = validationResult(req);
      if (!errors.isEmpty()) {
        return res.status(400).json({ errors: errors.array() });
      } 
      

If the user provides all fields and passes this phase, then I check if there is alredy exists user with the email that user provded. Nothing special here. Just like in most of the apps. Afterwards we use encrypt custom function to save user's password and password's iv.

Login

User has now registered, then is able to login to the system. Similiar structure here again. Checking req.body fields with express-validator. And the rest of them is standart login logics.

Brute Force Attacks

What is Brute Force Attacks?

Lets take a look at what does wikipedia says about brute force attacks.

In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing a combination correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found. Alternatively, the attacker can attempt to guess the key which is typically created from the password using a key derivation function. This is known as an exhaustive key search.

One thing should be mentioned in login is that, I used express-brute package to prevent unlimited requests. This package provides a brute-force protection middleware for express routes that rate-limits incoming requests, increasing the delay with each request in a fibonacci-like sequence.

I set some configuration in the login using express-brute. 20000 ms for minWait and 6 for freeRetries. But what are they ?

minWait: The initial wait time (in milliseconds) after the user runs out of retries

freeRetries: The number of retires the user has before they need to start waiting


// Handling brute force response

export const handleManyRequest = (err) => {
  if (err?.data?.error?.text === "Too many requests in this time frame.") {
    return toast.error(
      "TOO MANY REQUESTS RECEIVED. PLEASE WAIT SOME TIME THEN TRY AGAIN",
      {
        position: "top-center",
      },
    );
  }
};



// Login User with redux action

export const login = (data, history) => async (dispatch) => {
  try {
    const { email, password } = data;
    const res = await Axios.post(`${serverURL}/api/user/login`, {
      email,
      password,
    });
    dispatch({
      type: LOGIN_SUCCESS,
      payload: res.data,
    });
    dispatch(loadUser());
    history.push("/identity");
    return res;
  } catch (err) {
    handleManyRequest(err.response);
    const errors = err.response?.data?.errors;
    if (errors) {
      errors.forEach((error) =>
        toast.error(error.msg, { position: "top-center", toastId: "login" }),
      );
    }
    dispatch({
      type: LOGIN_FAIL,
    });
  }
};


Below is a live example in the app. I tried to login with wrong credentials couple of times. Afterwards I get this response.

image

image

image

Usage of Compare and Decryption Custom Functions In Login

const ExpressBrute = require("express-brute");
const store = new ExpressBrute.MemoryStore();
const bruteforce = new ExpressBrute(store, {
  minWait: 20000, // 20 seconds
  freeRetries: 6,
});
const { compare } = require("../custom-services/Encryption");


router.post(
  "/login",
  bruteforce.prevent,
  [
    check("email", "Email is required").not().isEmpty(),
    check("email", "Please provide valid e-mail").isEmail(),
    check("password", "Password is required").not().isEmpty(),
  ],
  async (req, res) => {
    try {
      const errors = validationResult(req);
      if (!errors.isEmpty()) {
        return res.status(400).json({ errors: errors.array() });
      }
      const { email, password } = req.body;
      // Check if the user exists in db
      let user = await User.findOne({ email });
      // User not found with the given email
      if (!user) {
        return res
          .status(400)
          .json({ errors: [{ msg: "Invalid Credentials" }] });
      }
      // Check if the password is true
      const isMatch = compare(password, {
        iv: user.iv,
        password: user.password,
      });
      // User not found with the given password
      if (!isMatch) {
        return res
          .status(400)
          .json({ errors: [{ msg: "Invalid Credentials" }] });
      }
      const payload = {
        user: {
          id: user.id,
          name: user.name,
          surname: user.surname,
          email: user.email,
        },
      };
      const token = jwt.sign(
        payload,
        process.env.JWT_SECRET || config.get("jwtSecret"),
        {
          expiresIn: 480000,
        }
      );
      await user.save();
      res.status(200).json({ token });
    } catch (err) {
      return res.status(500).send();
    }
  }
);

On the other hand, I used my custom compare and decrypt function in the login. What happens here is that, we check the credentials in the login, and if credentials are provdied properly, then we get the user from mongodb. And as I mentioned above, there are iv and password fields in the user document. I get these two fields and put into compare function second parameter. Remember, the first parameter of compare function was plain password text that the user provided in login. You can also check the steps above. Next step is, we are using decrypt function in compare in order to get plain password of hash data. To achieve that, I provide our algorithm and secret that I defined in the imports section. Algorithm and secret should be the same, otherwise we can not get proper results anyway.


const crypto = require("crypto");
const config = require("config");
const secret = process.env.CRYPTO_SECRET || config.get("secret.crypto");
const algorithm = "aes-256-ctr";
const iv = crypto.randomBytes(16);

// Using secret and passing encryption idx in order to decrpyt given password
const decrypt = (hash) => {
  const decipher = crypto.createDecipheriv(
    algorithm,
    secret,
    Buffer.from(hash.iv, "hex")
  );
  const decrpyted = Buffer.concat([
    decipher.update(Buffer.from(hash.password, "hex")),
    decipher.final(),
  ]);
  return decrpyted.toString();
};

const compare = (password, hash) => {
  const plainPassword = decrypt(hash);
  if (password === plainPassword) {
    return true;
  }
  return false;
};


JsonWebToken

At this moment, assuming user provided credentials properly and then will be logged in to the system. Meanwhile, in the auth app, I need to check on every refresh if the user is authenticated. Here comes JsonWebToken roles in. In login, we are creating payload object with user datas such as id, name, surname and email. Then I create a token with this payload and also with JWT secret which is critically important. Below is the example of code how the process went with creating jwt token. And let me also mention that I send this token to the client. Which is also important and will explain why I am sending it.

 const payload = {
        user: {
          id: user.id,
          name: user.name,
          surname: user.surname,
          email: user.email,
        },
      };
      const token = jwt.sign(
        payload,
        process.env.JWT_SECRET || config.get("jwtSecret"),
        {
          expiresIn: 480000,
        }
      );
      await user.save();
      res.status(200).json({ token });

I need to get this token in client. I send request with to my express endpoint. I get the token and right after I dispatch my redux action called as LOGIN_SUCCESS. What does LOGIN_SUCCESS do ? It saves the token to localStorage and also to redux state. And then, I send one more request to express api to identify logged in user. If the request succeeded, then I get the payload values about the user that I explained above.


// How I get token from express api ?

 const { email, password } = data;
    const res = await Axios.post(`${serverURL}/api/user/login`, {
      email,
      password,
    });
    dispatch({
      type: LOGIN_SUCCESS,
      payload: res.data,
    }); 
    if (localStorage.token) {
      setAuthToken(localStorage.token);
    }
    
    // Sending request to express api to identify logged in user
    
    const res = await Axios.get(`${serverURL}/api/user/auth`);
    dispatch({
      type: USER_LOADED,
      payload: res.data,
    });
    
    
    // What does LOGIN_SUCCESS do ?  
    
    case LOGIN_SUCCESS:
      localStorage.setItem("token", payload.token);
      return {
        ...state,
        token: payload.token,
        isAuthenticated: true,
        loading: false,
      };
    

Auth express endpoint

router.get("/auth", auth, async (req, res) => {
  try {
    const user = req.user;
    res.status(200).json(user);
  } catch (err) {
    res.status(500).send();
  }
});

From now on, every request I will do in auth app, will be checked by the middleware in express api. This means if user is not authenticated, will not be able to use the system features. In case of user is not authenticated, will be logged out of the system automatically. And will not be able to access auth app.


// Express auth middleware

module.exports = async (req, res, next) => {
  // Get token from header
  const token = req.header("x-auth-token");
  // Handle if token not provided
  if (!token) {
    return res.status(401).json({ msg: "No token,authorization denied" });
  }
  // Verify Token
  try {
    const decoded = jwt.decode(
      token,
      process.env.JWT_SECRET || config.get("jwtSecret")
    );
    const { id, name, surname, email } = decoded.user;
    let user = await User.findById(id);
    if (!user) {
      return res.status(500).json({
        errors: [
          {
            msg: "Server Error",
          },
        ],
      });
    }
    const userData = {
      id,
      name,
      surname,
      email,
    };
    req.user = userData;
    next();
  } catch (err) {
    res.status(401).json({ msg: "Token is not valid" });
  }
};


You might be asking how user will be logged out of the system automatically. It will happen with the redux state. As I told before, I was updating the redux state with login actions. So whenever user is not authenticated, isAuthenticated will be set to false. You may ask again how ?

So basically, I do load the user by sending api request to my express endpoint. If I send request while I have no token in my axios headers, then request will fail and it will go to catch block of function, which triggers AUTH_ERROR redux action. When AUTH_ERROR action calles, then isAuthenticated will be set false and other related fields will be resetted as well.

// loadUser function's catch block

 } catch (err) {
    const errors = err.response?.data?.errors;
    if (errors) {
      errors.forEach((error) =>
        toast.error(error.msg, { position: "top-center" }),
      );
    }
    dispatch({
      type: AUTH_ERROR,
    });
  }

// AUTH_ERROR redux state

 case AUTH_ERROR:
      localStorage.removeItem("token");
      return {
        ...state,
        token: null,
        user: null,
        isAuthenticated: false,
        loading: false,
      };

Okay, I set the isAuthenticated to false. Good progress but not enough. I also need to configure some private route in client so that if user is not authenticated, should go to login page. Here is how I've done it in React client side. I do check the redux state and send user to the login page if not authenticated.


const PrivateRoute = ({
  component: Component,
  auth: { user, isAuthenticated },
  ...rest
}) => {
  if (localStorage.token) {
    setAuthToken(localStorage.token);
  }
  React.useEffect(() => {
    store.dispatch(loadUser());
  }, []);
  return (
    <Route
      {...rest}
      render={(props) =>
        isAuthenticated === false && user === null ? (
          <Redirect to="/" />
        ) : (
          <Component {...props} />
        )
      }
    />
  );
};


Identities

Identity is the main feauture of this app. Users can view, create, edit and delete their own identites.

An example of identity from mongodb is showned below as screenshot.

image

More About Identities

Strong password

Identities are important. So while creating it, I need to create strong password for it. In order to achieve this, I used yup validation and regular expression while creating identity in a form. Yup is just a JavaScript schema builder for value parsing and validation. The way I used regular expression is for creating such strong passwords. Remember, passwords are more stronger with special characters and longer passwords means stronger as well.

const strongPasswordValidationMessage =
    "Your identity password must contain at least 8 characters, one uppercase, one lowercase, one number and one special character";
    
password: yup
      .matches(
        /^.*(?=.{8,})((?=.*[!@#$%^&*()\-_=+{};:,<.>]){1})(?=.*\d)((?=.*[a-z]){1})((?=.*[A-Z]){1}).*$/,
        strongPasswordValidationMessage,
      ),
      

Examples of creating identity with strong password and weak password.

image image

Creating - Updating Identity

A single identity has title, website, note, password fields. I save the password of identity in the same way I did in register. Which is with my custom encrypt function. That's why I will not going to mention about it again since it would be over explaining. I am using the same logic when I am updating the identity. And obviously, I need the add owner of identity in my express api so that whenever I fetch them from db, I can filter out them.


//  example of create identity code section

const hashedData = encrypt(password);
    const identity = new Identity({
      title,
      website,
      note,
      owner: req.user.id,
      password: hashedData.password,
      iv: hashedData.iv,
    });
    await identity.save();

Update Identity Example From The App

image

Deleting Identity

User can also delete identity if needed.

// Delete identity

router.delete("/:id", [auth, bruteforce.prevent], async (req, res) => {
  try {
    const id = req.params.id;
    let foundIdentity = await Identity.findOne({ _id: id });
    if (!foundIdentity) {
      return res.status(404).json({ errors: [{ msg: "No Identity Found !" }] });
    }
    await Identity.findOneAndDelete({ _id: id });
    return res.status(200).send();
  } catch (err) {
    return res.status(500).send();
  }
});

Fetching Identities

I do fetch the identities with the auth user id. In beginning, I did create a auth middleware so that I can get auth user datas in my express endpoints. Thanks to auth middleware, now I am able to get auth user id. Which is req.user.id.

But one thing is critical to mention here, that is I used brute force middleware in these routes as well.

I put a refresh feature to make things is easier. Instead of refreshing whole page with F5, user can refresh identities list by clicking one button. But it has a limits as well. Just like in login page. User can not send so many requests at once.

image

image

image

Similiar process going on here as well in order to block brute force attacks.


// Get all identities

router.get("/identity", [auth, bruteforce.prevent], async (req, res) => {
  try {
    const identities = await Identity.find({ owner: req.user.id });
    if (identities.length > 0) {
      // Return plain password in order to show it on client
      identities.map(
        (identity) =>
          (identity.password = decrypt({
            iv: identity.iv,
            password: identity.password,
          }))
      );
    }
    return res.status(200).json({ identities });
  } catch (err) {
    return res.status(500).send();
  }
});

Conclusion

The secure passwords app is a basic but powerful app for securing passwords that I tried to implement using MERN stack.

There will be improvements in near future.

Bug Report

I would like to get bug crash reports to my personal email.

tarikpnr147@gmail.com

About


Languages

Language:JavaScript 92.5%Language:CSS 5.4%Language:HTML 2.1%