[ https://issues.apache.org/jira/browse/SOLR-9609?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15638053#comment-15638053 ]
Erick Erickson commented on SOLR-9609: -------------------------------------- [~hgadre] The current patch already reads a variable from the security.json file (well, at least the code's in place to do that) and initializes the CryptoKey based on that parameter, or the default of 1024 if it's not present. Not tested, but looks fairly straightforward _assuming_ (which I haven't verified yet) that security.json is already available. My question is more along the lines of whether all this is worth it to have the flexibility of changing the length in CyptoKey via configuration. This is starting to seem like the tail wagging the dog. I mean all this cruft to change one integer? Is there a measurable downside to just allocating 4096 on the theory that that'll be good enough for the foreseeable future? 'cause then there's documentation. Then there's supporting it in future. And what about some kind of API support. And what about...... Seems like a lot of cycles to implement something of dubious utility. > Change hard-coded keysize from 512 to 1024 > ------------------------------------------ > > Key: SOLR-9609 > URL: https://issues.apache.org/jira/browse/SOLR-9609 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) > Reporter: Jeremy Martini > Assignee: Erick Erickson > Attachments: SOLR-9609.patch, SOLR-9609.patch, SOLR-9609.patch, > solr.log > > > In order to configure our dataSource without requiring a plaintext password > in the configuration file, we extended JdbcDataSource to create our own > custom implementation. Our dataSource config now looks something like this: > {code:xml} > <dataSource type="com.foo.FooDataSource" driver="oracle.jdbc.OracleDriver" > url="jdbc:oracle:thin:@db-host-machine:1521:tst1" user="testuser" > password="{ENC}{1.1}1ePOfWcbOIU056gKiLTrLw=="/> > {code} > We are using the RSA JSAFE Crypto-J libraries for encrypting/decrypting the > password. However, this seems to cause an issue when we try use Solr in a > Cloud Configuration (using Zookeeper). The error is "Strong key gen and > multiprime gen require at least 1024-bit keysize." Full log attached. > This seems to be due to the hard-coded value of 512 in the > org.apache.solr.util.CryptoKeys$RSAKeyPair class: > {code:java} > public RSAKeyPair() { > KeyPairGenerator keyGen = null; > try { > keyGen = KeyPairGenerator.getInstance("RSA"); > } catch (NoSuchAlgorithmException e) { > throw new SolrException(SolrException.ErrorCode.SERVER_ERROR, e); > } > keyGen.initialize(512); > {code} > I pulled down the Solr code, changed the hard-coded value to 1024, rebuilt > it, and now everything seems to work great. -- This message was sent by Atlassian JIRA (v6.3.4#6332) --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org For additional commands, e-mail: dev-h...@lucene.apache.org