You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@wicket.apache.org by "Martin Grigorov (JIRA)" <ji...@apache.org> on 2014/11/11 09:36:33 UTC
[jira] [Updated] (WICKET-5327) CryptoMapper: insecure default
encryption provider
[ https://issues.apache.org/jira/browse/WICKET-5327?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Martin Grigorov updated WICKET-5327:
------------------------------------
Fix Version/s: (was: 6.11.0)
> CryptoMapper: insecure default encryption provider
> --------------------------------------------------
>
> Key: WICKET-5327
> URL: https://issues.apache.org/jira/browse/WICKET-5327
> Project: Wicket
> Issue Type: Improvement
> Affects Versions: 6.10.0
> Reporter: Walter B. Rasmann
> Assignee: Sven Meier
> Labels: security
> Fix For: 7.0.0-M1
>
>
> There is an unexpected and insecure default setting for the encryption provider.
> When CryptoMapper is enabled using
> setRootRequestMapper(new CryptoMapper(getRootRequestMapper(), this));
> or
>
> CompoundRequestMapper root = new CompoundRequestMapper();
> root.add(new CryptoMapper(getRootRequestMapper(), this));
> setRootRequestMapper(root);
> Wicket uses "new CachingSunJceCryptFactory(ISecuritySettings.DEFAULT_ENCRYPTION_KEY)" as the CryptFactory, with ISecuritySettings.DEFAULT_ENCRYPTION_KEY being "WiCkEt-FRAMEwork". This generates always the same encrypted strings for each of the URLs and is possibly not a secure way to encrypt URLs even if the encryption key is unknown.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)