On 01/06/2014 04:19 PM, Adam Young wrote:
> Dirk,
> 
> If it were as  easy as just replaceing hteh hash algorithm, we would
> have done it a year + ago.  I'm guessing you figured that by now.
> 
> Here is the deal:  We need to be able to make things work side by side. 
> Not sure how to do that, but I think the right solution is to make
> keystone configurable first, so that you can set the hashing algorithm
> in the config file, and that python-keystoneclient should be able to
> handle both.  Since the PKC  doesn't tend to talk to multiple Keystones,
> that should probably be sufficient.
> 
> In the future, Keystones  need to be advertise, somehow, what Hashing
> algorithm it uses.  It probably can/should stick that data in the token.
> 
> Thoughts?
> 

Hello list!

How about we prefix the hash with the chosen algorithm, like the glibc
crypt method (ie: $id$hash) ? No prefix would mean the former md5.

This would allow a smooth migration as multiple hash algorithm could be
used simultaneously and keystone wouldn't have to announce what
algorithm it uses...

Cheers,
Tristan.

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

Reply via email to