Hi Gruss,
Crypt format has additional params (|param|name and its|value|: hash
complexity parameters, like rounds/iterations count ) which are not
applicable to current implementation. Also, hash algorithms shipped
with JDK are applicable (MD5, SHA1, SHA256) and any other algorithms
specified by crypt format will be ignored.
Crypt format can be used, but it is over-engineered for current
requirement/implementation. I am not opposed to using it and would
welcome input from other reviewers.
-Harsha
On Sunday 23 April 2017 08:10 PM, Bernd Eckenfels wrote:
Hm, why introduce a new password hash format. Just use modular crypt()
format (and iterations). This allows to use common tools (like
htpasswd) to generate the hashes. It would use $5$ prefix for SHA256
but actually I would use $6$ for iterated SHA512 as it is the default
on most recent Linux distributions.
Gruss
Bernd
--
http://bernd.eckenfels.net
------------------------------------------------------------------------
*From:* serviceability-dev
<serviceability-dev-boun...@openjdk.java.net> on behalf of Harsha
Wardhana B <harsha.wardhan...@oracle.com>
*Sent:* Sunday, April 23, 2017 12:20:57 PM
*To:* serviceability-dev@openjdk.java.net
*Subject:* RFE Review : JDK-5016517 - Replace plaintext passwords by
hashed passwords for out-of-the-box JMX Agent
Hi All,
Please review this enhancement to replace plain-text password for JMX
agent with SHA-256 hash.
Issue: https://bugs.openjdk.java.net/browse/JDK-5016517
<https://bugs.openjdk.java.net/browse/JDK-5016517>
webrev: http://cr.openjdk.java.net/~hb/5016517/webrev.00/
Overview of implementation:
Currently, the JMX agent password file used to authenticate user,
stores user name and password as clear text. Though system level
restrictions are recommended for jmx password file, passwords are
vulnerable since they are stored in clear. The current RFE proposes to
store passwords as SHA256 hash instead of clear text.
In current implementation, if password file is writable, and if
passwords are in clear, they will be replaced by SHA256 hash upon
agent boot-up or when login attempt is made.
The file,
src/jdk.management.agent/share/conf/jmxremote.password.template
contains more details about the implementation.
- Harsha