search
HomeBackend DevelopmentPHP TutorialPHP permanent login, remember me function implementation methods and safety practices_PHP tutorial

PHP permanent login, remember me function implementation methods and safety practices

  PHP permanent login, remember me function implementation methods and safety practices

This article mainly introduces the implementation methods and security practices of PHP permanent login and remember me functions. This article focuses on using the database to achieve more secure permanent login and remember me functions. Friends who need it can refer to it

Permanent login refers to a mechanism for continuous authentication between browser sessions. In other words, a user who is logged in today will still be logged in tomorrow, even if user sessions expire between visits. The presence of persistent logins reduces the security of your authentication mechanism, but it increases usability. Instead of troublesome users to authenticate each time they visit, provide the option to remember the login.

From what I have observed, the most common flawed permanent login scheme is to save the username and password in a cookie. The temptation to do this is understandable - instead of prompting the user for a username and password, you can simply read them from the cookie. The rest of the verification process is exactly the same as a normal login, so this scenario is a simple one.

However, if you do store your username and password in cookies, please turn off this feature immediately and read the rest of this section to find some ideas for implementing a more secure solution. You will also need to require all users who use this cookie to change their passwords in the future because their authentication information has been exposed.

Permanent login requires a permanent login cookie, often called an authentication cookie, because cookies are the only standard mechanism used to provide stable data across multiple sessions. If the cookie provides permanent access, it poses a serious risk to the security of your application, so you need to make sure that the data you save in the cookie can only be used for authentication for a limited period of time.

The first step is to devise a method to mitigate the risk posed by captured persistent login cookies. While cookie capture is something you want to avoid, having a defense-in-depth process is best, especially since this mechanism can make your validation form less secure even when everything is working fine. In this way, the cookie cannot be generated based on any information that provides a permanent login, such as the user's password.

To avoid using the user’s password, you can create an identity that is only valid for one-time verification:

The code is as follows:

$token = md5(uniqid(rand(), TRUE));

 ?>

You can save it in the user's session to associate it with a specific user, but this doesn't help you stay logged in across multiple sessions, which is a big deal. Therefore, you must use a different method to associate this identity with a specific user.

Since the username is less sensitive than the password, you can store it in a cookie, which can help the verification process to confirm which user ID is provided. However, a better approach is to use a secondary identity that is difficult to guess and discover. Consider adding three fields to the data table that stores usernames and passwords: a second identity (identifier), a permanent login identification (token), and a permanent login timeout (timeout).

The code is as follows:

mysql> DESCRIBE users;

  ------------ ------------------ ------ ----- ------ --- -------

| Field | Type | Null | Key | Default | Extra |

  ------------ ------------------ ------ ----- ------ --- -------

| username | varchar(25) | | PRI | | |

| password | varchar(32) | YES | | NULL | |

| identifier | varchar(32) | YES | MUL | NULL | |

| token | varchar(32) | YES | | NULL | |

| timeout | int(10) unsigned | YES | | NULL | |

  ------------ ------------------ ------ ----- ------ --- -------

By generating and saving a secondary identity and permanent login identity, you can create a cookie that does not contain any user authentication information.

The code is as follows:

 $salt = 'SHIFLETT';

$identifier = md5($salt . md5($username . $salt));

$token = md5(uniqid(rand(), TRUE));

 $timeout = time() 60 * 60 * 24 * 7;

setcookie('auth', "$identifier:$token", $timeout);

 ?>

When a user uses a permanent login cookie, you can check whether it meets several criteria:

The code is as follows:

 /* mysql_connect() */

 /* mysql_select_db() */

 $clean = array();

 $mysql = array();

$now = time();

 $salt = 'SHIFLETT';

list($identifier, $token) = explode(':', $_COOKIE['auth']);

 if (ctype_alnum($identifier) ​​&& ctype_alnum($token))

 {

 $clean['identifier'] = $identifier;

 $clean['token'] = $token;

 }

else

  {

  /* ... */

  }

  $mysql['identifier'] = mysql_real_escape_string($clean['identifier']);

  $sql = "SELECT username, token, timeout

  FROM users

  WHERE identifier = '{$mysql['identifier']}'";

  if ($result = mysql_query($sql))

  {

  if (mysql_num_rows($result))

  {

  $record = mysql_fetch_assoc($result);

  if ($clean['token'] != $record['token'])

  {

  /* Failed Login (wrong token) */

  }

  elseif ($now > $record['timeout'])

  {

  /* Failed Login (timeout) */

  }

  elseif ($clean['identifier'] !=

  md5($salt . md5($record['username'] . $salt)))

  {

  /* Failed Login (invalid identifier) */

  }

  else

  {

  /* Successful Login */

  }

  }

  else

  {

  /* Failed Login (invalid identifier) */

  }

  }

  else

  {

  /* Error */

  }

  ?>

  你应该坚持从三个方面来限制永久登录cookie的使用。

  1.Cookie需在一周内(或更少)过期

  2.Cookie最好只能用于一次验证(在一次成功验证后即删除或重新生成)

  3.在服务器端限定cookie在一周(或更少)时间内过期

  如果你想要用户无限制的被记住,那只要是该用户的访问你的应用的频度比过期时间更大的话,简单地在每次验证后重新生成标识并设定一个新的cookie即可。

  另一个有用的原则是在用户执行敏感操作前需要用户提供密码。你只能让永久登录用户访问你的应用中不是特别敏感的功能。在执行一些敏感操作前让用户手工进行验证是不可替代的步骤。

  最后,你需要确认登出系统的用户是确实登出了,这包括删除永久登录cookie:

  复制代码 代码如下:

  

  setcookie('auth', 'DELETED!', time());

  ?>

  上例中,cookie被无用的值填充并设为立即过期。这样,即使是由于一个用户的时钟不准而导致cookie保持有效的话,也能保证他有效地退出。

www.bkjia.comtruehttp://www.bkjia.com/PHPjc/990992.htmlTechArticlePHP永久登录、记住我功能实现方法和安全做法 PHP永久登录、记住我功能实现方法和安全做法 这篇文章主要介绍了PHP永久登录、记住我功能...
Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
php怎么把负数转为正整数php怎么把负数转为正整数Apr 19, 2022 pm 08:59 PM

php把负数转为正整数的方法:1、使用abs()函数将负数转为正数,使用intval()函数对正数取整,转为正整数,语法“intval(abs($number))”;2、利用“~”位运算符将负数取反加一,语法“~$number + 1”。

php怎么实现几秒后执行一个函数php怎么实现几秒后执行一个函数Apr 24, 2022 pm 01:12 PM

实现方法:1、使用“sleep(延迟秒数)”语句,可延迟执行函数若干秒;2、使用“time_nanosleep(延迟秒数,延迟纳秒数)”语句,可延迟执行函数若干秒和纳秒;3、使用“time_sleep_until(time()+7)”语句。

php怎么除以100保留两位小数php怎么除以100保留两位小数Apr 22, 2022 pm 06:23 PM

php除以100保留两位小数的方法:1、利用“/”运算符进行除法运算,语法“数值 / 100”;2、使用“number_format(除法结果, 2)”或“sprintf("%.2f",除法结果)”语句进行四舍五入的处理值,并保留两位小数。

php字符串有没有下标php字符串有没有下标Apr 24, 2022 am 11:49 AM

php字符串有下标。在PHP中,下标不仅可以应用于数组和对象,还可应用于字符串,利用字符串的下标和中括号“[]”可以访问指定索引位置的字符,并对该字符进行读写,语法“字符串名[下标值]”;字符串的下标值(索引值)只能是整数类型,起始值为0。

php怎么根据年月日判断是一年的第几天php怎么根据年月日判断是一年的第几天Apr 22, 2022 pm 05:02 PM

判断方法:1、使用“strtotime("年-月-日")”语句将给定的年月日转换为时间戳格式;2、用“date("z",时间戳)+1”语句计算指定时间戳是一年的第几天。date()返回的天数是从0开始计算的,因此真实天数需要在此基础上加1。

php怎么读取字符串后几个字符php怎么读取字符串后几个字符Apr 22, 2022 pm 08:31 PM

在php中,可以使用substr()函数来读取字符串后几个字符,只需要将该函数的第二个参数设置为负值,第三个参数省略即可;语法为“substr(字符串,-n)”,表示读取从字符串结尾处向前数第n个字符开始,直到字符串结尾的全部字符。

php怎么替换nbsp空格符php怎么替换nbsp空格符Apr 24, 2022 pm 02:55 PM

方法:1、用“str_replace(" ","其他字符",$str)”语句,可将nbsp符替换为其他字符;2、用“preg_replace("/(\s|\&nbsp\;||\xc2\xa0)/","其他字符",$str)”语句。

php怎么判断有没有小数点php怎么判断有没有小数点Apr 20, 2022 pm 08:12 PM

php判断有没有小数点的方法:1、使用“strpos(数字字符串,'.')”语法,如果返回小数点在字符串中第一次出现的位置,则有小数点;2、使用“strrpos(数字字符串,'.')”语句,如果返回小数点在字符串中最后一次出现的位置,则有。

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

VSCode Windows 64-bit Download

VSCode Windows 64-bit Download

A free and powerful IDE editor launched by Microsoft

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version