Details

    Description

      New auth plugin:

      • uses KDF (try to use what openssl provides)
      • salted
      • uses server- and client-side scrambles
      • set as default auth plugin
      • ed25519 based? (or try to use what openssl provides)
      • support old hashes?

      reduce roundtrips:

      • set as default (MDEV-12320)
      • allow clients to provide the salt (--plugin-salt=XXX)
        • if it's incorrect — connection fails.
        • PASSWORD() returns the salt in a Note
      revised idea

      Password generation and storage

      • the KDF function is pbkdf2 (supported by everything, including windows native, Java, javascript, PHP, .NET
      • parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), iteration count, salt, key_length, together with derived key = PBKDF2(func, password, salt, iteration_count, key_length)
      • number of iterations is a power of 2, greater than 9
      • the algorithm is ed25519, "hash" is the public key generated using ed25519 from the PBKDF2(password)

      The authentication string, stored by the server, is

      concat('P', conv(log2(iterations)-10, 10, 62), ':', base64(salt), ':', base64(hash))
      

      that e.g. P0:WW9sXaaL/o:vubFBzIrapbfHct1/J72dnUryz5VS7lA6XHH8sIx4TI

      • it consists of colon-separated fields
      • first field is 'P' (denotes KDF algorithm = PBKDF2) and the number of iterations, '0' means 1024, '1' means 2048, etc
      • then salt
      • then the password hash

      Let's call everything except the password hash the ext-salt, in the example above it's P0:WW9sXaaL/o

      Login process, packet exchange

      1. Server sends the welcome packet with a 32-byte random scramble

      2 . if the ext-salt was specified in the .my.cnf, the client skips to step 4, otherwise it sends the user name (and nothing else) to the server

      3. Server sends the ext-salt to the client

      4. Client sends the random 32-byte scramble, and the concat(server scramble, client scramble) ed25519-signed by a secret key generated from the PBKDF2(password, ext-salt)

      5. Server replies with "ok" or "acces denied"

      first idea

      Rough idea

      • the KDF function is pbkdf2 (supported by everything, including windows native, Java, javascript, PHP, .NET
      • parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length)

      Login process, packet exchange

      1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length.
      This is the only unencrypted message during entire exchange

      2 . Client computes derived key from password and parameters:
      derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length)
      Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server

      3. server decrypts ServerVerificationChallenge and sends

      ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key))

      4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble).
      If they don't match, client could not verify the server, and error is reported.

      Client still has to prove it has the password, not just the derived key
      So it sends
      ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key)

      5. Server verifies the client
      a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key)
      b) hashed_password=substr(tmp, hash_length)
      c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length)
      and compares derived_key and derived_key2 for equality, (due to the HMAC_collisions property of pbkdf2, password and hash_func(password) would produce the same keys)
      Server sends OK or ERR packet

      Attachments

        Issue Links

          Activity

            C/C 3.4 is already released with PARSEC support.

            nikitamalyavin Nikita Malyavin added a comment - C/C 3.4 is already released with PARSEC support.

            Should parsec work ootb in server 11.6.2 ?
            I had do lower plugin_maturity to beta to be able to load the plugin.

            swiffer Matthias Wirtz added a comment - Should parsec work ootb in server 11.6.2 ? I had do lower plugin_maturity to beta to be able to load the plugin.

            Hello, swiffer!

            Yes, it is supposed to just work, but I think 11.6.2 still needed openssl on windows.

            What's your setup, and what are the steps to reproduce?

            nikitamalyavin Nikita Malyavin added a comment - Hello, swiffer ! Yes, it is supposed to just work, but I think 11.6.2 still needed openssl on windows. What's your setup, and what are the steps to reproduce?

            I'm running MariaDB 11.6.2 on Ubuntu 24.04. Within /etc/mysql/mariadb.conf.d/50-server.cnf I enabled the parsec plugin as described in the mariadb docs via plugin_load_add = auth_parsec.

            MariaDB emmits these ERRORs on startup:

            Nov 21 19:34:03 XXX mariadbd[46425]: 2024-11-21 19:34:03 0 [ERROR] mariadbd: Can't open shared library 'auth_parsec.so' (errno: 1, Loading of beta plugin parsec is prohibited by >
            Nov 21 19:34:03 XXX mariadbd[46425]: 2024-11-21 19:34:03 0 [ERROR] Couldn't load plugins from 'auth_parsec.so'.

            Adding plugin_maturity = beta to the conf solved the issue for now. I guess the Plugin maturity hasn't been bumped when going from 11.6.1 to 11.6.2.

            swiffer Matthias Wirtz added a comment - I'm running MariaDB 11.6.2 on Ubuntu 24.04. Within /etc/mysql/mariadb.conf.d/50-server.cnf I enabled the parsec plugin as described in the mariadb docs via plugin_load_add = auth_parsec. MariaDB emmits these ERRORs on startup: Nov 21 19:34:03 XXX mariadbd [46425] : 2024-11-21 19:34:03 0 [ERROR] mariadbd: Can't open shared library 'auth_parsec.so' (errno: 1, Loading of beta plugin parsec is prohibited by > Nov 21 19:34:03 XXX mariadbd [46425] : 2024-11-21 19:34:03 0 [ERROR] Couldn't load plugins from 'auth_parsec.so'. Adding plugin_maturity = beta to the conf solved the issue for now. I guess the Plugin maturity hasn't been bumped when going from 11.6.1 to 11.6.2.

            thanks, created MDEV-35482

            nikitamalyavin Nikita Malyavin added a comment - thanks, created MDEV-35482

            People

              nikitamalyavin Nikita Malyavin
              serg Sergei Golubchik
              Votes:
              0 Vote for this issue
              Watchers:
              11 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved:

                Git Integration

                  Error rendering 'com.xiplink.jira.git.jira_git_plugin:git-issue-webpanel'. Please contact your Jira administrators.