Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:95856 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 38010 invoked from network); 9 Sep 2016 12:46:10 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 9 Sep 2016 12:46:10 -0000 Authentication-Results: pb1.pair.com header.from=me@kelunik.com; sender-id=unknown Authentication-Results: pb1.pair.com smtp.mail=me@kelunik.com; spf=permerror; sender-id=unknown Received-SPF: error (pb1.pair.com: domain kelunik.com from 81.169.146.220 cause and error) X-PHP-List-Original-Sender: me@kelunik.com X-Host-Fingerprint: 81.169.146.220 mo4-p00-ob.smtp.rzone.de Received: from [81.169.146.220] ([81.169.146.220:17260] helo=mo4-p00-ob.smtp.rzone.de) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id AA/87-61313-01FA2D75 for ; Fri, 09 Sep 2016 08:46:10 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1473425166; l=14256; s=domk; d=kelunik.com; h=Content-Type:Cc:To:Subject:Date:From:References:In-Reply-To: MIME-Version; bh=LHDXqz01C63ap2D2nhU0ZmVFp2ezM68MGIVnG4js+ek=; b=vtAmc7KRpGoFUo9tYoa29h7cx8uWMLeWyvDis/ZKHaLPuhKmRio7RMXQOPfocQYfktT xyMlKDeZsga+7rfE2xagZK/LzmxacynHRynBDEguRoMvwGqjhaZ+U99B9wSs8BxXUKzC7 LRaQ//WfvhxULmz8ZZnf9yXp5BWCMCNouOA= X-RZG-AUTH: :IWkkfkWkbvHsXQGmRYmUo9mls2vWuiu+7SLGvomb4bl9EfHtO3A6 X-RZG-CLASS-ID: mo00 Received: from mail-wm0-f43.google.com ([74.125.82.43]) by smtp.strato.de (RZmta 39.1 AUTH) with ESMTPSA id z0162bs89Ck6Go3 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (curve secp384r1 with 384 ECDH bits, eq. 7680 bits RSA)) (Client did not present a certificate) for ; Fri, 9 Sep 2016 14:46:06 +0200 (CEST) Received: by mail-wm0-f43.google.com with SMTP id w12so12230203wmf.0 for ; Fri, 09 Sep 2016 05:46:06 -0700 (PDT) X-Gm-Message-State: AE9vXwM5yWr0Pmp2A1wYIFuyvgDvAxN+oKam3vyNot2fkdFF5XJx0lhh6GtD87H4rbyS8H3mtG1hvkdsyCGS6g== X-Received: by 10.28.54.5 with SMTP id d5mr2978317wma.91.1473425166039; Fri, 09 Sep 2016 05:46:06 -0700 (PDT) MIME-Version: 1.0 Received: by 10.28.180.7 with HTTP; Fri, 9 Sep 2016 05:46:05 -0700 (PDT) In-Reply-To: References: Date: Fri, 9 Sep 2016 14:46:05 +0200 X-Gmail-Original-Message-ID: Message-ID: To: Arvids Godjuks Cc: Yasuo Ohgaki , "internals@lists.php.net" Content-Type: multipart/alternative; boundary=001a11436b6aa098ae053c1287d2 Subject: Re: [PHP-DEV] [RFC] Make uniqid() more unique From: me@kelunik.com (Niklas Keller) --001a11436b6aa098ae053c1287d2 Content-Type: text/plain; charset=UTF-8 2016-09-09 13:18 GMT+02:00 Arvids Godjuks : > > > 2016-09-09 13:37 GMT+03:00 Niklas Keller : > >> 2016-09-09 10:36 GMT+02:00 Arvids Godjuks : >> >>> 2016-09-09 11:07 GMT+03:00 Yasuo Ohgaki : >>> >>>> On Fri, Sep 9, 2016 at 4:40 PM, Niklas Keller wrote: >>>> > I think it's better to leave it as is and deprecate and discourage >>>> its use. >>>> > There's already a big warning there. Dunno whether there are really >>>> valid >>>> > use cases for it. >>>> >>>> uniqid() is handy, when developer would like to sort something by >>>> "time" prefix/postfix in strings. For example, prefixed/postfixed >>>> session ID by "time". >>>> >>>> So E_DEPRECATE might be too much. >>>> >>>> Regards, >>>> >>>> -- >>>> Yasuo Ohgaki >>>> yohgaki@ohgaki.net >>>> >>> >>> It's also useful in other cases, where using a full blown true random >>> source is just overkill. >>> >> >> Most people think getting true random is a overkill and implement things >> non-secure. >> > > I just don't need true random here, just some form of replacing an integer > ID with a value, that cannot be changed just by "+1" > If you know the time something was created you can still easily retrieve it. It's not "+1" anymore, but only slightly better. > >> >>> For example, my recent usage was to use the result of uniqid('', true) >>> as a few parameters in URL's instead of plain numeric ID. Client just >>> wanted to users can't do a +1 and see someone else's result page that might >>> have a different text or a different campaign even. >>> >> >> That's exactly where uniqid SHOULD NOT be used. It's predictable. Anyone >> can easily guess these URLs. If you want to prevent that, you should use >> non-predictable secure random, also called cryptographically secure random: >> CSRPNG. See random_bytes and random_int. >> > > The way the system works and that this is a semi-closed tool for business > purposes, the only real thing why we need these ID's is to track people. > Before this plain numeric ID's from the DB records were used. With the > rewrite the client asked to make ID's so you can't just do a +1 and see > something different. No one will ever want to try and break the uniqid algo > just to get the other page (probably the same text). I also use the > extended version of the uniqid. > uniqid() is just the current time. It's enough to be about unique in some scenarios, but it's never unpredictable. If you want people not being able to guess these URLs (by adding +1 or whatever), you need unpredictable random. uniqid() doesn't fit here. uniqid("", true) doesn't fit either, as it's just adding more time resolution and ONLY ONE SINGLE CHAR of random data, which may be predictable, too, dunno what the generator here really does. > And I do need to generate those id's in bursts - 200 to 600 id's in a >>> single action, I would imagine generating 600 random strings of ~20 char >>> length can be hard on the source of the randomness, may even deplete it. >>> And I expect the numbers to grow. >>> >> >> Could you outline why you need 200 - 600 IDs in a single action? >> > > Because it's a CSV import and I need to assign every record an ID at that > moment. Those ID's are then exported by admins to a 3rd party system. > >> >> >>> So, deprecating it I think is really an overreaction. It's a handy tool. >>> It can be used to generate filenames too, and a lot of other stuff. >>> >> >> Sure, but for that you can as well just use `microtime` or `time`. As >> shown, it's easily misused, you're the perfect example. :-) >> > > microtime and time are easier to guess. And time() is not an option, > because I will get 600 equal ID's then. Microtime is an option, but then > you get number only string and it looks awfully sequential :) Hence the > uniqid usage, that is basically time + microtime if I understand from the > manual, but it generates a bit more random result and I'm sure I get a > unique value on every call. Improving it so it does not look awfully > sequential would suffice for the use cases it is needed. In my case this > was a clearly conscious choice with full understanding how it works. > > My thoughts are - improve it. Yes, the standard uniqid() is a bit too >>> short, I have never used it without the second "true" parameter and that >>> dot in the middle of the string is annoying - I had to strip it out every >>> use case I had. >>> >> >> `true` gives you exactly one character of more, pretty low entropy. >> >> Regards, Niklas >> > > Hm, without "true" you get 13 chars, with "true" - 20+. > You get more chars, it's still predictable. Regards, Niklas --001a11436b6aa098ae053c1287d2--