Github user alopresto commented on the issue:

    https://github.com/apache/nifi/pull/2089
  
    I would suggest adding user notes and clear documentation to ensure users 
are aware that while `SHA-1` and salted SHA-1 (`SSHA`) hashing are supported 
for compatibility with existing systems, [RFC 
2307](https://tools.ietf.org/html/rfc2307#section-7) notes that these 
algorithms are old, and [SHA-1 has seen collisions in the 
wild](https://shattered.io/). 
    
    There is [extended 
support](https://www.redpill-linpro.com/techblog/2016/08/16/ldap-password-hash.html)
 using the OS `crypt` module for stronger hashing algorithms like `SHA-512` to 
be used with additional rounds, effectively creating a key stretching algorithm 
similar to PBKDF2. 
    
    Additional reference: [OpenLDAP 
FAQ](http://www.openldap.org/faq/data/cache/347.html)


---

Reply via email to