The author of Crypt::Blowfish changed the default key size to 8 (from 0) in 
the latest version - and at the same time Crypt::CBC has logic that will 
either use a value returned by Crypt::Blowfish (if it's more than 0) or 
default to 56 bytes.

So, the server OpenSRS code (running Crypt::Blowfish 2.06) uses 56 bytes for
the key size and if the client side uses the 2.08 version, then it will now
use 8 bytes for the key -> the client won't authenticate. Of course, upgrading
our server to the new version won't help either since then the clients using
the older versions of Crypt::Blowfish won't work.

I wrote the author of Crypt::CBC about this, meanwhile either use the 2.06 
version for now or apply this patch against the 2.08 version of Blowfish.pm:

--- Blowfish.orig   Tue Nov 13 01:19:45 2001
+++ Blowfish.pm Tue Nov 13 01:20:24 2001
@@ -31,7 +31,7 @@


 sub blocksize   {  8; } # /* byte my shiny metal.. */
-sub keysize     {  8; } # /* we'll leave this at 8 .. for now.  expect
change. */
+sub keysize     {  0; } # /* we'll leave this at 8 .. for now.  expect
change. */
 sub min_keysize {  8; }
 sub max_keysize { 56; }  


Regards,
Vlad


On Mon, 12 Nov 2001, Charles Daminato wrote:

> This just came out, turns out it doesn't (yet) work with our servers,
> which are running 2.06
> 
> We'll be running some tests to determine if upgrading the server does not
> affect clients running older versions of Blowfish.  In the interim, you
> can get the older working version here:
> 
> http://cpan.valueclick.com/authors/id/D/DP/DPARIS/
> 
> Charles Daminato
> TUCOWS Product Manager
> [EMAIL PROTECTED]
> 
> 

Reply via email to