[ http://issues.apache.org/jira/browse/DERBY-962?page=all ]

Sunitha Kambhampati updated DERBY-962:
--------------------------------------

    Attachment: Derby962.diff.txt
                Derby962.stat.txt

This issue was blocked by derby-1080.  Now that 1080 is committed, I have 
regenerated the patch for 962 and am attaching Derby962.diff.txt and 
Derby962.stat.txt.    

The changes in this patch are the same as compared to the changes in 
Derby962_forreview.txt that were specific to derby 962,  except for the 
following:
-- I have added the table that was in  962_table.txt into the test code  per 
Kathey's comments and also added some comments from the jira to the test code. 

I ran derbynetclientmats and derbynetmats ok on linux/ibm142 with the known 
failures in Surtest.    I ran testSecMec on windows with JCC2.4, JCC2.6 and 
derbyclient on ibm and sun jvms , versions 131,141,142,15 ok. 

derbyall is still running. I will post results here as they finish. 

Can someone please review this change. Thanks. 

> Upgrade default security mechanism in client to use encrypted userid password 
> if client can support it.
> -------------------------------------------------------------------------------------------------------
>
>          Key: DERBY-962
>          URL: http://issues.apache.org/jira/browse/DERBY-962
>      Project: Derby
>         Type: Improvement
>   Components: Network Client
>     Reporter: Sunitha Kambhampati
>     Assignee: Sunitha Kambhampati
>      Fix For: 10.2.0.0
>  Attachments: 962_table.txt, Derby962.diff.txt, Derby962.stat.txt, 
> Derby962_forreview.diff.txt, Derby962_forreview.stat.txt
>
> Currently in the client, if userid and password are set in the connection 
> url, the default security mechanism is upgraded to USRIDPWD (which is clear 
> text userid and password).  This seems to be a security hole here. 
> Current client  driver supports encrypted userid/password (EUSRIDPWD) via the 
> use of DH key-agreement protocol - however current Open Group DRDA 
> specifications imposes small prime and base generator values (256 bits) that 
> prevents other JCE's  (apt from ibm jce) to be used as java cryptography 
> providers.  
> Some thoughts:
> -- client can make a check to see if it the jvm it is running in supports the 
> encryption necessary for EUSRIDPWD. If it supports, then the client can 
> upgrade to EUSRIDPWD. 
> -- if the jvm the client is running is , doesnt support encryption 
> requirements for EUSRIDPWD, then the security mechanism will be set to 
> USRIDPWD.
> -- DERBY-528 will add support for strong userid and password which is another 
> option to send encrypted passwords across the wire. When this gets added, 
> maybe this can be considered as one of the upgrade options after EUSRIDPWD. 

-- 
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators:
   http://issues.apache.org/jira/secure/Administrators.jspa
-
For more information on JIRA, see:
   http://www.atlassian.com/software/jira

Reply via email to