DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=6402>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=6402

JNDIRealm, LDAP and SHA passwords vs {SHA}Base64Coded= passwords

[EMAIL PROTECTED] changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|                            |FIXED



------- Additional Comments From [EMAIL PROTECTED]  2002-03-24 22:04 -------
By default JNDIRealm now authenticates a user by binding to the directory using 
the DN of the user's directory entry and the presented password. This removes 
the need for the realm to know about anything about password digests at all, 
let alone encoding schemes such as {SHA}, since the directory handles all 
aspects of password hashing. For that reason I've marked the bug as resolved.

It is still possible to configure the realm to apply a digest algorithm to the 
presented password, retrieve the stored password or password hash, and compare 
the two explicitly. This of course won't currently work if an encoding prefix 
like {SHA} is used or the digest itself is Base64 encoded. However, I believe 
authentication by binding is always the better approach except when support for 
HTTP digest authentication is required - in which case I think the plaintext 
password must be stored anyway - so I see little point in having JNDIRealm 
decode{SHA} and similar schemes.

--
To unsubscribe, e-mail:   <mailto:[EMAIL PROTECTED]>
For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>

Reply via email to