Tuesday, November 22, 2022

[389-users] Re: Wrong password hash algorithm returned

> On 23 Nov 2022, at 00:43, Mark Reynolds <mareynol@redhat.com> wrote:
>
>
> On 11/22/22 9:30 AM, Thierry Bordaz wrote:
>>
>> On 11/22/22 10:28, Julian Kippels wrote:
>>> Hi Thierry,
>>>
>>> that's a nasty catch…
>>>
>>> On the one hand I think this is a nice feature to improve security, but on the other hand PBKDF2_SHA256 is the one algorithm that freeradius cannot cope with.
>>>
>>> I suppose there is no way to revert all changed hashes after I set "nsslapd-enable-upgrade-hash" to "off"? Other than to reinitialize all affected suffixes from the export of the old servers?
>>
>>
>> Indeed this is a bad side effect of the default value :(
>>
>> If you need to urgently fix those new {PBKDF2_SHA256}, then reinit is the way to go. Else you could change the default password storage to SSHA and keep nsslapd-enable-upgrade-hash=on. So that it will revert, on bind, to the SSHA hash.
>
> This reminds me of an enhancement I thought proposed awhile ago, where the upgrade hash plugin can be configured to use a specific algorithm (upgrade or downgrade). Might be worth considering it now...
>
> Mark

It just uses whatever you have set as default. We don't have a concept of "hash strength" in the project, so the "upgrade hash" is more like "force rotate the hash to what I have configured".

> to the SSHA hash.

Do not use SSHA. Never use SSHA. SSHA is plaintext in 2022. You may as well be setting "clear".

You *must* not use a verification hash to store passwords. You certainly must NOT use one that is cryptograhically broken.

In 389-ds today the following algorithms should be considered INSECURE and UNSUITABLE for password hashing and in many cases MAY be a violation of your legal requirements for user data protection.

clear
NS-MTA-MD5
MD5
SMD5
SHA
SSHA
SHA256
SSHA256
SHA512
SSHA512
CRYPT_UNIX
CRYPT_MD5
PBKDF2
PBKDF2-SHA1


The following ARE suitable.

CRYPT_SHA256
CRYPT_SHA512
PBKDF2_SHA256
PBKDF2-SHA256
PBKDF2-SHA512

The *BEST* choices are:

1) PBKDF2-SHA256 (note this is the hyphen version, not the underscore version)
2) CRYPT_SHA256


It is *STRONGLY* recommended you use one of these two.

--
Sincerely,

William Brown

Senior Software Engineer,
Identity and Access Management
SUSE Labs, Australia

_______________________________________________
389-users mailing list -- 389-users@lists.fedoraproject.org
To unsubscribe send an email to 389-users-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/389-users@lists.fedoraproject.org
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue

No comments:

Post a Comment