summaryrefslogtreecommitdiff
path: root/app/models/session.rb
blob: 27687eb247dde63fb61d096b5fb28fe1d116b2eb (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
class Session < ActiveRecord::Base
	belongs_to :user

	def owned_by?(tuser)
		self.user == tuser
	end

	##
	# Create a random remember token for the user. This will be
	# changed every time the user creates a new session.
	#
	# If you want this value, hang on to it; the raw value is
	# discarded afterward.
	#
	# By changing the cookie every new session, any hijacked sessions
	# (where the attacker steals a cookie to sign in as a certain
	# user) will expire the next time the user signs back in.
	#
	# The random string is of length 16 composed of A-Z, a-z, 0-9
	# This is the browser's cookie value.
	def create_token()
		t = SecureRandom.urlsafe_base64
		self.token = Session.hash_token(t)
		t
	end

	##
	# Encrypt the remember token.
	# This is the encrypted version of the cookie stored on
	# the database.
	#
	# The reasoning for storing a hashed token is so that even if
	# the database is compromised, the attacker won't be able to use
	# the remember tokens to sign in.
	def Session.hash_token(token)
		# SHA-1 (Secure Hash Algorithm) is a US engineered hash
		# function that produces a 20 byte hash value which typically
		# forms a hexadecimal number 40 digits long.
		# The reason I am not using the Bcrypt algorithm is because
		# SHA-1 is much faster and I will be calling this on
		# every page a user accesses.
		#
		# https://en.wikipedia.org/wiki/SHA-1
		Digest::SHA1.hexdigest(token.to_s)
	end
end