[
https://issues.apache.org/jira/browse/JCR-2919?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13113396#comment-13113396
]
Felix Meschberger commented on JCR-2919:
----------------------------------------
> System.getProperty(NodeIdFactory.SEQUENTIAL_NODE_ID)
Are you kidding ? Are we really configuring this through system properties ?
> Security of token base authentication
> -------------------------------------
>
> Key: JCR-2919
> URL: https://issues.apache.org/jira/browse/JCR-2919
> Project: Jackrabbit Content Repository
> Issue Type: Bug
> Components: jackrabbit-core, security
> Affects Versions: 2.3.0
> Reporter: Michael Dürig
> Assignee: angela
> Fix For: 2.3.0
>
>
> Token based authentication as implemented with JCR-2851 seems to exhibit a
> security issue: the token returned by the server consists of the identifier
> of a (newly created) node in the repository. An attacker who is able to guess
> (or acquire by other means i.e. via log files) that identifier will be
> granted access to the repository. Worse yet, JCR-2857 introduces sequential
> node ids. Guessing is a piece of cake in such a setup.
> I think we should decouple authentication secrets from node ids. A simple
> solution would be to store the secret in a token attribute and delegate
> generation of the secret to a dedicated handler. Such a handler can then use
> a secure random generator, private/public key encryption or whatever other
> method that is deemed appropriate to generate the authentication secret.
> Initial discussion see: http://markmail.org/thread/aspetgvmj2qud25a
--
This message is automatically generated by JIRA.
For more information on JIRA, see: http://www.atlassian.com/software/jira