Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Prevent timing attacks to guess Gradio passwords #7440

Merged
merged 5 commits into from Feb 15, 2024
Merged

Conversation

abidlabs
Copy link
Member

@abidlabs abidlabs commented Feb 15, 2024

This way we compare passwords is vulnerable to timing attack to guess the password. This PR uses hmac to prevent that, as described here: https://sqreen.github.io/DevelopersSecurityBestPractices/timing-attack/python

@gradio-pr-bot
Copy link
Contributor

gradio-pr-bot commented Feb 15, 2024

🪼 branch checks and previews

Name Status URL
Spaces ready! Spaces preview
Website ready! Website preview
🦄 Changes detecting...

Install Gradio from this PR

pip install https://gradio-builds.s3.amazonaws.com/6601070af0bc8955e94479ad66aa426ba0215591/gradio-4.19.0-py3-none-any.whl

Install Gradio Python Client from this PR

pip install "gradio-client @ git+https://github.com/gradio-app/gradio@6601070af0bc8955e94479ad66aa426ba0215591#subdirectory=client/python"

@gradio-pr-bot
Copy link
Contributor

gradio-pr-bot commented Feb 15, 2024

🦄 change detected

This Pull Request includes changes to the following packages.

Package Version
gradio patch
  • Maintainers can select this checkbox to manually select packages to update.

With the following changelog entry.

Prevent timing attacks to guess Gradio passwords

Maintainers or the PR author can modify the PR title to modify this entry.

Something isn't right?

  • Maintainers can change the version label to modify the version bump.
  • If the bot has failed to detect any changes, or if this pull request needs to update multiple packages to different versions or requires a more comprehensive changelog entry, maintainers can update the changelog file directly.



def compare_passwords_securely(input_password: str, correct_password: str) -> bool:
return hmac.compare_digest(input_password, correct_password)
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this only works for ASCII characters. We should convert to bytes first something like input_password.encode("utf-8")

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ah nice catch



def compare_passwords_securely(input_password: str, correct_password: str) -> bool:
return hmac.compare_digest(input_password.encode(), correct_password.encode())
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Default encoding is utf-8

@abidlabs abidlabs added the v: patch A change that requires a patch release label Feb 15, 2024
@abidlabs
Copy link
Member Author

Done @freddyaboulton if you could take another look!

Copy link
Collaborator

@freddyaboulton freddyaboulton left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nice and quick fix @abidlabs !

@abidlabs abidlabs merged commit e329f1f into main Feb 15, 2024
7 checks passed
@abidlabs abidlabs deleted the timing-attacks branch February 15, 2024 20:59
@pngwn pngwn mentioned this pull request Feb 15, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
v: patch A change that requires a patch release
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants