Skip to content

Commit

Permalink
Improved get_random_string().
Browse files Browse the repository at this point in the history
Improved the behavior of get_random_string to re-seed itself each time it is called
if the system does not have a secure random number generator. This will change the
properties of the random string produced, but will be unpredictable to an attacker.


git-svn-id: http://code.djangoproject.com/svn/django/trunk@17581 bcc190cf-cafb-0310-a4f2-bffc1f526a37
  • Loading branch information
PaulMcMillan committed Feb 23, 2012
1 parent 239e41f commit 1525874
Showing 1 changed file with 22 additions and 2 deletions.
24 changes: 22 additions & 2 deletions django/utils/crypto.py
Expand Up @@ -7,12 +7,18 @@
import hashlib import hashlib
import binascii import binascii
import operator import operator
import time


# Use the system PRNG if possible
import random import random
try: try:
random = random.SystemRandom() random = random.SystemRandom()
using_sysrandom = True
except NotImplementedError: except NotImplementedError:
pass import warnings
warnings.warn('A secure pseudo-random number generator is not available '
'on your system. Falling back to Mersenne Twister.')
using_sysrandom = False


from django.conf import settings from django.conf import settings


Expand Down Expand Up @@ -47,11 +53,25 @@ def get_random_string(length=12,
allowed_chars='abcdefghijklmnopqrstuvwxyz' allowed_chars='abcdefghijklmnopqrstuvwxyz'
'ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789'): 'ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789'):
""" """
Returns a random string of length characters from the set of a-z, A-Z, 0-9. Returns a securely generated random string.
The default length of 12 with the a-z, A-Z, 0-9 character set returns The default length of 12 with the a-z, A-Z, 0-9 character set returns
a 71-bit value. log_2((26+26+10)^12) =~ 71 bits a 71-bit value. log_2((26+26+10)^12) =~ 71 bits
""" """
if not using_sysrandom:
# This is ugly, and a hack, but it makes things better than
# the alternative of predictability. This re-seeds the PRNG
# using a value that is hard for an attacker to predict, every
# time a random string is required. This may change the
# properties of the chosen random sequence slightly, but this
# is better than absolute predictability.
random.seed(
hashlib.sha256(
"%s%s%s" % (
random.getstate(),
time.time(),
settings.SECRET_KEY)
).digest())
return ''.join([random.choice(allowed_chars) for i in range(length)]) return ''.join([random.choice(allowed_chars) for i in range(length)])




Expand Down

0 comments on commit 1525874

Please sign in to comment.