什么是双HMAC验证,它如何工作?
API不会存储用户发送的未经要求的身份验证密钥。它仅存储Hashed身份验证密钥,以防止“通过”攻击(在其中泄漏的数据库的情况下,攻击者只会通过Hashed身份验证密钥来获得身份验证并作为真实用户执行操作)。服务器始终将从客户端收到的身份验证密钥放置,以防止此攻击向量。
如果Hashed身份验证密钥与数据库中的结果不匹配,则API以负面响应对失败表示负面响应。 API端通过使用双HMAC验证( https://www.nccgroup.trust/us/about-us/newsroom-and---------------------------/blog/2011/february/double-hmac-verification/ )。
不幸的是,该链接已经死了,Google搜索通常会指向相同的来源。当您需要原始键来验证签名时,您能解释一下双HMAC验证如何工作?谢谢
From the Mega Security Whitepaper:
The API does not store the unhashed Authentication Key sent by the user. It only stores the Hashed Authentication Key to prevent “pass-the-hash” attacks (wherein the scenario of a leaked database, an attacker would just pass the Hashed Authentication Key to get authenticated and carry out actions as the real user). The server always hashes the Authentication Key received from the client which prevents this attack vector.
If the Hashed Authentication Key does not match the result in the database, the API responds with a negative response to indicate failure. The API side avoids timing attacks here by using Double HMAC Verification (https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2011/february/double-hmac-verification/).
Unfortunately the link is dead and a google search often points back to the same source. Can you please explain how double hmac verification works when you need the original key to verify the signature? Thank you
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
该URL已通过Wayback Machine存档,因此您仍然可以阅读完整的博客文章: http://web.archive.org/web/201602030444316/https:/https://wwwwwww.nccgroup 。
最后,很容易,就像“双HMAC”的名称表示它使用相同的HMAC键执行了两次HMAC。
That URL has been archived by Wayback Machine so you can still read the full blog post: http://web.archive.org/web/20160203044316/https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2011/february/double-hmac-verification/
The post contains a C# code snippet that demonstrates how to perform a double HMAC verification. In the end is pretty easy, just as the name "double HMAC" indicates it performs an HMAC two times, using the same HMAC-key.