[ 
https://issues.apache.org/jira/browse/SYNCOPE-513?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14043468#comment-14043468
 ] 

Francesco Chicchiriccò commented on SYNCOPE-513:
------------------------------------------------

Fine for me.
I was thinking to empower SYNCOPE-290 for providing few parameters with 
sensible defaults: this would imply adding some entries to {{test}}'s and 
{{main}}'s {{content.xml}}; should you need any help with this, just shout :-)

> Make value encryption parametric
> --------------------------------
>
>                 Key: SYNCOPE-513
>                 URL: https://issues.apache.org/jira/browse/SYNCOPE-513
>             Project: Syncope
>          Issue Type: Improvement
>          Components: core
>    Affects Versions: 1.1.8
>            Reporter: Yann Diorcet
>             Fix For: 1.2.0
>
>
> In {{PasswordEncoder}} (1.1.X) / {{Encryptor}} (1.2.X) class the salt 
> mechanism configuration is hardcoded
> If the LDAP server doesn't use the same salt mechanism configuration, the 
> password can't be matched during authentication.
> For example SSHA digest from OpenDJ uses a suffixed 8 bytes salt (in hash and 
> plan)
> Original:
> {code}
>             digester.setIterations(100000);
>             digester.setSaltSizeBytes(16);
> {code}
> Modified for OpenDJ:
> {code}
>             digester.setIterations(1);
>             digester.setSaltSizeBytes(8);
>             digester.setInvertPositionOfPlainSaltInEncryptionResults(true);
>             digester.setInvertPositionOfSaltInMessageBeforeDigesting(true);
> {code}
> {{Encryptor}} can read from global configuration parameters so that you can 
> configure some aspect of the way how ciphered values (not only password 
> values in 1.2.X).



--
This message was sent by Atlassian JIRA
(v6.2#6252)

Reply via email to