You are viewing a plain text version of this content. The canonical link for it is here.
Posted to derby-dev@db.apache.org by "Rick Hillegas (Created) (JIRA)" <ji...@apache.org> on 2011/12/14 21:01:30 UTC

[jira] [Created] (DERBY-5538) Derby should use char[] to internally represent passwords, rather than String.

Derby should use char[] to internally represent passwords, rather than String.
------------------------------------------------------------------------------

                 Key: DERBY-5538
                 URL: https://issues.apache.org/jira/browse/DERBY-5538
             Project: Derby
          Issue Type: Bug
          Components: JDBC
            Reporter: Rick Hillegas


I noticed that routines like AuthenticationServiceBase.encryptUsingDefaultAlgorithm() represent plaintext passwords as Strings. This is unsafe because Strings are easy to sniff even after they go out of scope. See the discussion on DERBY-866. We should rephrase passwords as char[] and zero them out as soon as possible.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

[jira] [Updated] (DERBY-5538) Derby should use char[] to internally represent passwords, rather than String.

Posted by "Mamta A. Satoor (Updated) (JIRA)" <ji...@apache.org>.
     [ https://issues.apache.org/jira/browse/DERBY-5538?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Mamta A. Satoor updated DERBY-5538:
-----------------------------------

    Labels: derby_triage10_9  (was: )
    
> Derby should use char[] to internally represent passwords, rather than String.
> ------------------------------------------------------------------------------
>
>                 Key: DERBY-5538
>                 URL: https://issues.apache.org/jira/browse/DERBY-5538
>             Project: Derby
>          Issue Type: Bug
>          Components: JDBC
>    Affects Versions: 10.8.2.2
>            Reporter: Rick Hillegas
>              Labels: derby_triage10_9
>
> I noticed that routines like AuthenticationServiceBase.encryptUsingDefaultAlgorithm() represent plaintext passwords as Strings. This is unsafe because Strings are easy to sniff even after they go out of scope. See the discussion on DERBY-866. We should rephrase passwords as char[] and zero them out as soon as possible.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira