Details
-
Improvement
-
Status: Closed
-
Major
-
Resolution: Fixed
-
None
-
None
Description
Currently the SCRAM-* authentication managers store the salted hashed password. If this information is somehow leaked then the possesor of the information could use this value to log in to the broker without knowing the plain test password.
We can change the storage mechanism to store instead the "storedKey" and "serverKey" which will not allow the possesor of the leaked configuration to authenticate - they will need to know either the plain text password or the hashed slated password - which cannot be recovered from the password file.
Attachments
Attachments
Issue Links
- is related to
-
QPID-7067 Scram SHA upgrader loses the original password
- Closed