You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@wicket.apache.org by "Martin Grigorov (JIRA)" <ji...@apache.org> on 2014/11/11 09:36:33 UTC

[jira] [Updated] (WICKET-5327) CryptoMapper: insecure default encryption provider

     [ https://issues.apache.org/jira/browse/WICKET-5327?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Martin Grigorov updated WICKET-5327:
------------------------------------
    Fix Version/s:     (was: 6.11.0)

> CryptoMapper: insecure default encryption provider
> --------------------------------------------------
>
>                 Key: WICKET-5327
>                 URL: https://issues.apache.org/jira/browse/WICKET-5327
>             Project: Wicket
>          Issue Type: Improvement
>    Affects Versions: 6.10.0
>            Reporter: Walter B. Rasmann
>            Assignee: Sven Meier
>              Labels: security
>             Fix For: 7.0.0-M1
>
>
> There is an unexpected and insecure default setting for the encryption provider.
> When CryptoMapper is enabled using
> setRootRequestMapper(new CryptoMapper(getRootRequestMapper(), this));
> or
>                 
> CompoundRequestMapper root = new CompoundRequestMapper();
> root.add(new CryptoMapper(getRootRequestMapper(), this));
> setRootRequestMapper(root);
> Wicket uses "new CachingSunJceCryptFactory(ISecuritySettings.DEFAULT_ENCRYPTION_KEY)" as the CryptFactory, with ISecuritySettings.DEFAULT_ENCRYPTION_KEY being "WiCkEt-FRAMEwork". This generates always the same encrypted strings for each of the URLs and is possibly not a secure way to encrypt URLs even if the encryption key is unknown.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)