[ https://issues.apache.org/jira/browse/SYNCOPE-513?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14043468#comment-14043468 ]
Francesco Chicchiriccò commented on SYNCOPE-513: ------------------------------------------------ Fine for me. I was thinking to empower SYNCOPE-290 for providing few parameters with sensible defaults: this would imply adding some entries to {{test}}'s and {{main}}'s {{content.xml}}; should you need any help with this, just shout :-) > Make value encryption parametric > -------------------------------- > > Key: SYNCOPE-513 > URL: https://issues.apache.org/jira/browse/SYNCOPE-513 > Project: Syncope > Issue Type: Improvement > Components: core > Affects Versions: 1.1.8 > Reporter: Yann Diorcet > Fix For: 1.2.0 > > > In {{PasswordEncoder}} (1.1.X) / {{Encryptor}} (1.2.X) class the salt > mechanism configuration is hardcoded > If the LDAP server doesn't use the same salt mechanism configuration, the > password can't be matched during authentication. > For example SSHA digest from OpenDJ uses a suffixed 8 bytes salt (in hash and > plan) > Original: > {code} > digester.setIterations(100000); > digester.setSaltSizeBytes(16); > {code} > Modified for OpenDJ: > {code} > digester.setIterations(1); > digester.setSaltSizeBytes(8); > digester.setInvertPositionOfPlainSaltInEncryptionResults(true); > digester.setInvertPositionOfSaltInMessageBeforeDigesting(true); > {code} > {{Encryptor}} can read from global configuration parameters so that you can > configure some aspect of the way how ciphered values (not only password > values in 1.2.X). -- This message was sent by Atlassian JIRA (v6.2#6252)