[ 
https://issues.apache.org/jira/browse/KARAF-1037?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Christoph updated KARAF-1037:
-----------------------------

    Priority: Major  (was: Minor)
    
> karaf console command "jaas:adduser" with encrypted password
> ------------------------------------------------------------
>
>                 Key: KARAF-1037
>                 URL: https://issues.apache.org/jira/browse/KARAF-1037
>             Project: Karaf
>          Issue Type: Bug
>          Components: karaf-core
>    Affects Versions: 2.2.4
>         Environment: CentOS-5.7-x86_64, Mac OS X 10.7.2, Java 1.6.0_29
>            Reporter: Christoph
>              Labels: security
>   Original Estimate: 24h
>  Remaining Estimate: 24h
>
> The karaf console shows a strange behavior when working with JAAS 
> authentication modules and password encryption
> Line of actions that lead to the issue:
> (1) First of all, we've created a blueprint service containing the JAAS 
> configuration
> {noformat} 
> <blueprint xmlns="http://www.osgi.org/xmlns/blueprint/v1.0.0"; 
> xmlns:jaas="http://karaf.apache.org/xmlns/jaas/v1.0.0";
>   xmlns:cm="http://aries.apache.org/blueprint/xmlns/blueprint-cm/v1.1.0"; 
> xmlns:ext="http://aries.apache.org/blueprint/xmlns/blueprint-ext/v1.0.0";>
>   <type-converters>
>     <bean 
> class="org.apache.karaf.jaas.modules.properties.PropertiesConverter" />
>   </type-converters>
>     <!-- Allow usage of System properties, especially the karaf.base property 
> -->
>   <ext:property-placeholder placeholder-prefix="$[" placeholder-suffix="]" />
>   <jaas:config name="myRealm">
>     <jaas:module 
> className="org.apache.karaf.jaas.modules.properties.PropertiesLoginModule"
>                  flags="required">
>       users = $[karaf.base]/etc/myUser.properties
>       encryption.enabled = true
>       encryption.prefix = {CRYPT}
>       encryption.suffix = {CRYPT}
>       encryption.algorithm = MD5
>       encryption.encoding = hexadecimal
>     </jaas:module>
>   </jaas:config>
> </blueprint>
> {noformat}
> (2) After installing the realm as a feature in our service gateway, we 
> configure two users with roles via the karaf command line interface
> {noformat}
> karaf@tesb> jaas:manage myRealm
> karaf@tesb> jaas:useradd usr.app cert1
> karaf@tesb> jaas:roleadd usr.app admin
> karaf@tesb> jaas:roleadd usr.app dev
> karaf@tesb> jaas:update
> {noformat}
> and can find something like the following entry in our myUser.properties file
> {noformat}
> usr.app = 510fd1dc93d0c601ad208ad700afc403,admin,dev
> {noformat}
> (3) When we execute a service call that triggers our authentication chain, 
> the myUser.properties file changes to something like:
> {noformat}
> usr.app = {CRYPT}b3bef7f3d410589d471f93f6d55db6d4{CRYPT},admin,dev
> {noformat}
> This behaviour lead's us to the assumption, that the configuration via the 
> karaf command line interface using JAAS commands does not create the 
> encryption tag's but an initial hash set. When the application is using than 
> the hash the first time, it does think that the password is not hashed yet, 
> and creates a second hash with the pre- and suffix but makes the initial 
> password useless.
> Workaround for that issue is to avoid pre- and suffix for custom JAAS 
> authentication modules

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: 
https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

Reply via email to