On Mon, 2014-01-06 at 17:00 +0100, Tristan Cacqueray wrote:
> On 01/06/2014 04:19 PM, Adam Young wrote:
> > Dirk,
> > 
> > If it were as  easy as just replaceing hteh hash algorithm, we would
> > have done it a year + ago.  I'm guessing you figured that by now.
> > 
> > Here is the deal:  We need to be able to make things work side by side. 
> > Not sure how to do that, but I think the right solution is to make
> > keystone configurable first, so that you can set the hashing algorithm
> > in the config file, and that python-keystoneclient should be able to
> > handle both.  Since the PKC  doesn't tend to talk to multiple Keystones,
> > that should probably be sufficient.
> > 
> > In the future, Keystones  need to be advertise, somehow, what Hashing
> > algorithm it uses.  It probably can/should stick that data in the token.
> > 
> > Thoughts?
> > 
> 
> Hello list!
> 
> How about we prefix the hash with the chosen algorithm, like the glibc
> crypt method (ie: $id$hash) ? No prefix would mean the former md5.
> 
> This would allow a smooth migration as multiple hash algorithm could be
> used simultaneously and keystone wouldn't have to announce what
> algorithm it uses...

+1. Simple and effective.

-jay


_______________________________________________
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

Reply via email to