help-gsasl
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: SCRAM methods


From: - Neustradamus -
Subject: RE: SCRAM methods
Date: Fri, 3 Jan 2020 15:19:43 +0000




De: Simon Josefsson
Envoyé: Vendredi 03 janvier 2020 16:03
À: - Neustradamus -
Cc: address@hidden
Objet: Re: SCRAM methods

- Neustradamus - <address@hidden> writes:

> Simon, can you add the code on GitHub?
> It will be better and it will be nice to have PRs from other devs...

I'll consider setting up a GitLab mirror of the git repository, but I
prefer not to touch GitHub.

|| You can now work directly on GitLab and create an official mirror on GitHub like a lot of organizations/companies, users/devs...


> -> gsasl clone to fix SCRAM-SHA1 server side.
> - https://github.com/20centaurifux/gsasl/commits/master

That implements what Jeremy suggested in another email (quite
identically actually!), however it has the more fundamental design flaw
that I realized when thinking about this.  So I don't think this is a
good idea.

|| Look year of the commits ;)


> - https://github.com/ClickHouse-Extras/libgsasl/commits/master

This seems to a cmake-based port of libgsasl.  Interesting, but I don't
see any other improvements and I'm happy with autoconf.

> - https://github.com/markpizz/gsasl/commits/master

This has Visual Studio improvements that I would like to see too, but it
is not my priority right now and it is done in a way that makes it
difficult to review or apply.


|| Can you look other GitHub repositories too? No a lot ;)

> I hope a 1.8.2 or 1.9.0 with all changes included SCRAM-SHA-256(-PLUS).

Me too :-)

> If you can add all the family? 224/384/512 too, it will be nice 🙂
> - SCRAM-SHA-1
> - SCRAM-SHA-1-PLUS
> - SCRAM-SHA-224
> - SCRAM-SHA-224-PLUS
> - SCRAM-SHA-256
> - SCRAM-SHA-256-PLUS
> - SCRAM-SHA-384
> - SCRAM-SHA-384-PLUS
> - SCRAM-SHA-512
> - SCRAM-SHA-512-PLUS
>
> It will be possible to have?
> - SHA-512/224
> - SHA-512/256
> - SHA-512/384
>
> But why, for example:
> https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme

I think adding these variants are harmful.  They are not standardized by
the IETF, and I don't even see any proposal to standardize them.  The
SASL framework does not scale well with many different authentication
mechanisms, so there is interop considerations in adding too many of
them.  Unless there is work in the IETF to standardize these, I'm not
going to make this a priority.


|| It is SCRAM-SHA-2 family it is already used in other libs/softs (Cyrus SASL for example).

|| Look all SCRAM informations here: https://github.com/scram-xmpp/info/issues/1

|| I have contacted the draft author, there will have SHA-512/256, he can not change it (badly).


> When 256... will be added, please update the website (http://www.gnu.org/software/gsasl/)
> -> RFC7677
>
> You can already do:
>
> Please change:
>
> - Jabberd2, a XMPP server.
> ->
> - jabberd2, an XMPP server
>
> And remove all "." in the list, it is not needed ->
> - GNU Emacs, in the Gnus MUA
> - GNU Mailutils
> - GNU Anubis
> - MSMTP
> - MPOP
> - VMIME
> - Vortex Library, a BEEP stack
> - jabberd2, an XMPP server

Thank you, applied now!

|| THANKS.

/Simon

reply via email to

[Prev in Thread] Current Thread [Next in Thread]