Return-Path: X-Original-To: apmail-directory-dev-archive@www.apache.org Delivered-To: apmail-directory-dev-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 1EAFAF2DC for ; Thu, 11 Apr 2013 09:49:30 +0000 (UTC) Received: (qmail 54908 invoked by uid 500); 11 Apr 2013 09:49:29 -0000 Delivered-To: apmail-directory-dev-archive@directory.apache.org Received: (qmail 53953 invoked by uid 500); 11 Apr 2013 09:49:22 -0000 Mailing-List: contact dev-help@directory.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: "Apache Directory Developers List" Delivered-To: mailing list dev@directory.apache.org Received: (qmail 53849 invoked by uid 99); 11 Apr 2013 09:49:19 -0000 Received: from arcas.apache.org (HELO arcas.apache.org) (140.211.11.28) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 11 Apr 2013 09:49:19 +0000 Date: Thu, 11 Apr 2013 09:49:19 +0000 (UTC) From: "Peter Hmelak (JIRA)" To: dev@directory.apache.org Message-ID: In-Reply-To: References: Subject: [jira] [Commented] (DIRSERVER-1822) Same password can be used multiple times, when SSHA is used for password hash. MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 [ https://issues.apache.org/jira/browse/DIRSERVER-1822?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13628796#comment-13628796 ] Peter Hmelak commented on DIRSERVER-1822: ----------------------------------------- Well correct me if I'm wrong, but I do believe that majority of enterprise users do not use ldap clients (that would send hashed password) to change their passwords. Actually I believe none do. Instead they use the use web applications, that then sends plain-text password via secure connection to ldap server, where server side hook hashes the password. So my preposition above should be able to work. I still consider allowing same password as in history to pass trough constraint, just because salt is used, as a bug. > Same password can be used multiple times, when SSHA is used for password hash. > ------------------------------------------------------------------------------ > > Key: DIRSERVER-1822 > URL: https://issues.apache.org/jira/browse/DIRSERVER-1822 > Project: Directory ApacheDS > Issue Type: Bug > Reporter: Peter Hmelak > Assignee: Kiran Ayyagari > > When using SSHA (salted SHA) for password hashing, no CONSTRAINT_VIOLATION (invalid reuse of password present in password history) is thrown, if new password is the same as one already in pwdHistory. > I believe current implementation just compares new password hash, with with ones stored in pwdHistory. > And because of new salt, no two hashes are ever a-like, even though passwords are the same. > Suggestion for fix: > *Every* salt stored in pwdHistory should be used, together with new password when creating password hashes, that are then compared with ones already stored in pwdHistory. -- This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators For more information on JIRA, see: http://www.atlassian.com/software/jira