[Date Prev][Date Next] [Chronological] [Thread] [Top]

Re: Schema: encrypted 8-bit userPassword and SASLprep



Michael Ströder writes:
>Hallvard B Furuseth wrote:
>> [Schema] 2.41 (userPassword) says:
>> 
>>    The application SHOULD prepare textual strings used as passwords
>>    by transcoding them to Unicode, applying SASLprep [SASLprep], and
>>    encoding as UTF-8.
>> 
>> This is incompatible with passwords written in 8-bit character sets and
>> stored encrypted in files that cannot easily be decrypted, e.g. Unix
>> /etc/passwd files.  Since the server does not know the plaintext
>> passwords, it cannot prepare them as above.
> 
> IMHO the password should be encoded as UTF-8 before applying the hash.
> Maybe the wording is somewhat misleading though I'm not sure.

No.  LDAP can't mandate how Unix should encode its /etc/passwd files,
and therefore also how the login, su and passwd programs should work.

> Note that hashed passwords are non-standard anyway... ;-)

No, they are irrelevant to the standard:
- The client binds with a plaintext password (hopefully inside TLS).
  So the hashed password doesn't affect the protocol.
- The server matches the password from the client against the hashed
  password, with the same algorithm as the login program does.

-- 
Hallvard