On Wed, Mar 20, 2013 at 08:42:17PM -0400, David Nalley wrote: > On Wed, Mar 20, 2013 at 8:34 PM, Chip Childers > <chip.child...@sungard.com> wrote: > > On Wed, Mar 20, 2013 at 11:26:50AM -0700, Vijayendra Bhamidipati wrote: > >> Hi Chip, Prasanna, > >> > >> Yes, the change is pretty straightforward, the reasoning is to make > >> default password encoding more secure because the SHA256salted > >> authenticator recently added by Hugo salts the passwords while the > >> existing MD5 authenticator doesn't, and is the default. This change gives > >> the CS admin the flexibility to choose the ordering of the > >> encoders/authenticators. No new authenticator/encoder classes needed to be > >> added, the existing ones are simply used better. > >> > >> Upgrade scenarios were considered and these changes will have no effect on > >> upgrades. Only new users and updated users will have their passwords > >> encoded by the first valid encoder in the UserPasswordEncoder list. > >> Existing users will still get authenticated as before since authentication > >> passes through all the authenticators available in the UserAuthenticator > >> list until one of them succeeds or all fail. > >> > >> Regards, > >> Vijay > > > > Does everyone believe that this is a valid change for 4.1? Or should we > > wait for 4.2 or 4.1.1? > > > > 4.2 > Review request is for master > Lets try an minimize change to 4.1 if at all possible. > > --David >
The bug was marked for 4.1, which was the confusion. I've changed the bug fix-version to 4.2. This can be reviewed by Hugo or Kelvin as requested by Vijayendra.