HTTP headers enable the exchange of information between the server and client regarding the connection setup, the requested resource, and the resource provided in response. Ignoring HTTP headers can leak sensitive information.
Express apps, by default, include the X-Powered-By
header. This header lets the browser know the server’s version and vendor used. Hackers can cross-reference this with publicly disclosed vulnerabilities, allowing your app to be targeted easily.
One solution is to use Helmet.js. It is a Node.js module that helps secure your app by setting various HTTP headers. Helmet helps hide the X-Powered-By
header, thus preventing the disclosure of server information, and sets security headers such as Content-Security-Policy, X-Frame-Options
, Strict-Transport-Security
, etc.
Implementing secure password storage#
Storing passwords securely is one of the most critical aspects of application security. If user passwords are compromised, it can lead to unauthorized access and data breaches. Storing passwords in plain text is a severe security risk. If your database is compromised, attackers immediately access all user accounts.
Password encryption allows you to convert your passwords into an unreadable message using an encryption key. The encryption key is a mathematical value you and the recipient know.
Hashing vs. encryption#
Encryption transforms data into a different format using a key, and the original data can be retrieved using a decryption key. Encryption is reversible, which makes it unsuitable for password storage.
Hashing converts data into a fixed-size string of characters, typically a digest that cannot be reversed to obtain the original data. Hashing is a one-way function, making it ideal for password storage.
Hashing is different from encryption because it doesn’t have a decryption key. Hashing should always include salt
, a random value added to the password before hashing. Salting passwords adds uniqueness, making it much harder for attackers to use precomputed tables (rainbow tables) to crack the hashes.
Here’s how it works: Suppose the user’s password is Pa55word
. When hashed using a secure algorithm like bcrypt
, it might look like $2b$10$wqGJ3YQ0yRhv5Tc.s7.Y
. When the user logs in, the entered password is hashed again with the same algorithm and compared to the stored hash. If the two hashes match, you are signed in.
Hashing passwords#
For Node.js, you can use the bcrypt
package to hash and store passwords. When a user registers or changes their password, you should hash the password before storing it in the database.