> On Aug. 6, 2013, 8:57 p.m., Chiradeep Vittal wrote:
> > plugins/user-authenticators/sha256salted/src/com/cloud/server/auth/SHA256SaltedUserAuthenticator.java,
> >  line 43
> > <https://reviews.apache.org/r/13252/diff/3/?file=337200#file337200line43>
> >
> >     What is the impact on upgrades? That is, I already have users with salt 
> > length 20. You might have to check with both?
> >     Also, you could make it 'final static int' I guess.

Thanks for the comment!
Changed "encode" method to refer to length of salt bytes passed instead of 
static length - old salts can thus still be 20 bytes.
This change will avoid a potential IndexOutOfBounds exception.


- Amogh


-----------------------------------------------------------
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/13252/#review24743
-----------------------------------------------------------


On Aug. 6, 2013, 9:45 p.m., Amogh Vasekar wrote:
> 
> -----------------------------------------------------------
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/13252/
> -----------------------------------------------------------
> 
> (Updated Aug. 6, 2013, 9:45 p.m.)
> 
> 
> Review request for cloudstack and John Burwell.
> 
> 
> Bugs: https://issues.apache.org/jira/browse/CLOUDSTACK-2312 and 
> https://issues.apache.org/jira/browse/CLOUDSTACK-2314
> 
> 
> Repository: cloudstack-git
> 
> 
> Description
> -------
> 
> 1. Fix timing attack by using a constant-time comparison function
> 2. Increase salt size
> 3. Make flow for invalid user go through full normal execution using a fake 
> password and salt
> 
> 
> Diffs
> -----
> 
>   
> plugins/user-authenticators/sha256salted/src/com/cloud/server/auth/SHA256SaltedUserAuthenticator.java
>  da939273ea10bff3b2687c9684edf8a5d0ab4b2e 
> 
> Diff: https://reviews.apache.org/r/13252/diff/
> 
> 
> Testing
> -------
> 
> Local environment
> 
> 
> Thanks,
> 
> Amogh Vasekar
> 
>

Reply via email to