MessageVerifier makes it easy to generate and verify messages which are signed to prevent tampering.
This is useful for cases like remember-me tokens and auto-unsubscribe links where the session store isn’t suitable or available.
Remember Me:
cookies[:remember_me] = @verifier.generate([@user.id, 2.weeks.from_now])
In the authentication filter:
id, time = @verifier.verify(cookies[:remember_me])
if time < Time.now
self.current_user = User.find(id)
end
# File lib/active_support/message_verifier.rb, line 40
40: def generate(value)
41: data = ActiveSupport::Base64.encode64s(Marshal.dump(value))
42: "#{data}--#{generate_digest(data)}"
43: end
# File lib/active_support/message_verifier.rb, line 29
29: def verify(signed_message)
30: raise InvalidSignature if signed_message.blank?
31:
32: data, digest = signed_message.split("--")
33: if data.present? && digest.present? && secure_compare(digest, generate_digest(data))
34: Marshal.load(ActiveSupport::Base64.decode64(data))
35: else
36: raise InvalidSignature
37: end
38: end
# File lib/active_support/message_verifier.rb, line 57
57: def generate_digest(data)
58: require 'openssl' unless defined?(OpenSSL)
59: OpenSSL::HMAC.hexdigest(OpenSSL::Digest.const_get(@digest).new, @secret, data)
60: end
constant-time comparison algorithm to prevent timing attacks
# File lib/active_support/message_verifier.rb, line 47
47: def secure_compare(a, b)
48: return false unless a.bytesize == b.bytesize
49:
50: l = a.unpack "C#{a.bytesize}"
51:
52: res = 0
53: b.each_byte { |byte| res |= byte ^ l.shift }
54: res == 0
55: end
Disabled; run with --debug to generate this.
Generated with the Darkfish Rdoc Generator 1.1.6.