You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@qpid.apache.org by "Rob Godfrey (JIRA)" <ji...@apache.org> on 2016/01/12 15:46:39 UTC
[jira] [Created] (QPID-6993) [Java Broker] Improve security of
SCAM-* authentication managers by not storing the salted passwords
Rob Godfrey created QPID-6993:
---------------------------------
Summary: [Java Broker] Improve security of SCAM-* authentication managers by not storing the salted passwords
Key: QPID-6993
URL: https://issues.apache.org/jira/browse/QPID-6993
Project: Qpid
Issue Type: Improvement
Components: Java Broker
Reporter: Rob Godfrey
Assignee: Rob Godfrey
Fix For: qpid-java-6.1
Currently the SCRAM-* authentication managers store the salted hashed password. If this information is somehow leaked then the possesor of the information could use this value to log in to the broker without knowing the plain test password.
We can change the storage mechanism to store instead the "storedKey" and "serverKey" which will not allow the possesor of the leaked configuration to authenticate - they will need to know either the plain text password or the hashed slated password - which cannot be recovered from the password file.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@qpid.apache.org
For additional commands, e-mail: dev-help@qpid.apache.org