You are viewing a plain text version of this content. The canonical link for it is here.
Posted to derby-dev@db.apache.org by "Dinuka Kodithuwakku (JIRA)" <ji...@apache.org> on 2017/09/25 05:12:00 UTC
[jira] [Assigned] (DERBY-5538) Derby should use char[] to
internally represent passwords, rather than String.
[ https://issues.apache.org/jira/browse/DERBY-5538?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Dinuka Kodithuwakku reassigned DERBY-5538:
------------------------------------------
Assignee: Dinuka Kodithuwakku
> Derby should use char[] to internally represent passwords, rather than String.
> ------------------------------------------------------------------------------
>
> Key: DERBY-5538
> URL: https://issues.apache.org/jira/browse/DERBY-5538
> Project: Derby
> Issue Type: Bug
> Components: JDBC
> Affects Versions: 10.8.2.2
> Reporter: Rick Hillegas
> Assignee: Dinuka Kodithuwakku
> Labels: derby_triage10_9
>
> I noticed that routines like AuthenticationServiceBase.encryptUsingDefaultAlgorithm() represent plaintext passwords as Strings. This is unsafe because Strings are easy to sniff even after they go out of scope. See the discussion on DERBY-866. We should rephrase passwords as char[] and zero them out as soon as possible.
--
This message was sent by Atlassian JIRA
(v6.4.14#64029)