Details
-
New Feature
-
Status: Closed (View Workflow)
-
Critical
-
Resolution: Fixed
Description
New auth plugin:
- uses KDF (try to use what openssl provides)
- salted
- uses server- and client-side scrambles
- set as default auth plugin
- ed25519 based? (or try to use what openssl provides)
- support old hashes?
reduce roundtrips:
- set as default (MDEV-12320)
- allow clients to provide the salt (--plugin-salt=XXX)
- if it's incorrect — connection fails.
- PASSWORD() returns the salt in a Note
Password generation and storage
- the KDF function is pbkdf2 (supported by everything, including windows native, Java, javascript, PHP, .NET
- parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), iteration count, salt, key_length, together with derived key = PBKDF2(func, password, salt, iteration_count, key_length)
- number of iterations is a power of 2, greater than 9
- the algorithm is ed25519, "hash" is the public key generated using ed25519 from the PBKDF2(password)
The authentication string, stored by the server, is
concat('P', conv(log2(iterations)-10, 10, 62), ':', base64(salt), ':', base64(hash)) |
that e.g. P0:WW9sXaaL/o:vubFBzIrapbfHct1/J72dnUryz5VS7lA6XHH8sIx4TI
- it consists of colon-separated fields
- first field is 'P' (denotes KDF algorithm = PBKDF2) and the number of iterations, '0' means 1024, '1' means 2048, etc
- then salt
- then the password hash
Let's call everything except the password hash the ext-salt, in the example above it's P0:WW9sXaaL/o
Login process, packet exchange
1. Server sends the welcome packet with a 32-byte random scramble
2 . if the ext-salt was specified in the .my.cnf, the client skips to step 4, otherwise it sends the user name (and nothing else) to the server
3. Server sends the ext-salt to the client
4. Client sends the random 32-byte scramble, and the concat(server scramble, client scramble) ed25519-signed by a secret key generated from the PBKDF2(password, ext-salt)
5. Server replies with "ok" or "acces denied"
Rough idea
- the KDF function is pbkdf2 (supported by everything, including windows native, Java, javascript, PHP, .NET
- parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length)
Login process, packet exchange
1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length.
This is the only unencrypted message during entire exchange
2 . Client computes derived key from password and parameters:
derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length)
Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server
3. server decrypts ServerVerificationChallenge and sends
ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key))
4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble).
If they don't match, client could not verify the server, and error is reported.
Client still has to prove it has the password, not just the derived key
So it sends
ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key)
5. Server verifies the client
a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key)
b) hashed_password=substr(tmp, hash_length)
c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length)
and compares derived_key and derived_key2 for equality, (due to the HMAC_collisions property of pbkdf2, password and hash_func(password) would produce the same keys)
Server sends OK or ERR packet
Attachments
Issue Links
- causes
-
MDEV-34424 Replica server crashes with an invalid pointer when using a user created with the PARSEC plugin for replication
-
- Closed
-
-
MDEV-34742 parsec client doesn't build on OS X
-
- Closed
-
-
MDEV-34743 PARSEC client doesn't work on Windows
-
- Closed
-
-
MDEV-34854 Parsec sends garbage when using an empty password
-
- Closed
-
-
MDEV-35254 PARSEC plugin should allow DBAs to specify number of iterations
-
- Open
-
-
MDEV-35482 Raise the plugin PARSEC maturity
-
- Closed
-
- relates to
-
CONC-705 support plugin->options() method
-
- Open
-
-
CONJ-1193 Implement parsec authentication
-
- Closed
-
-
CONJS-299 Parsec authentication implementation
-
- Closed
-
-
MDEV-34744 server cannot load client plugins on Debian
-
- Open
-
-
MDEV-34846 PARSEC authentication improvement
-
- Open
-
-
MDEV-34933 The test plugins.rpl_auth uses not_msan.inc without a good reason
-
- Open
-
-
MXS-5130 Support for PARSEC auth plugin from MDEV-32618
-
- Closed
-
-
MDEV-12320 configurable default authentication plugin for the server
-
- Stalled
-
- links to
Activity
Field | Original Value | New Value |
---|---|---|
Description |
New auth plugin:
* uses KDF * salted * uses server- and client-side scrambles * set as default auth plugin * ed25119 based? |
New auth plugin:
* uses KDF * salted * uses server- and client-side scrambles * set as default auth plugin * ed25119 based? verify that if client has mysql_native_password as default, there's no extra roundtrip |
Description |
New auth plugin:
* uses KDF * salted * uses server- and client-side scrambles * set as default auth plugin * ed25119 based? verify that if client has mysql_native_password as default, there's no extra roundtrip |
New auth plugin:
* uses KDF * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? verify that if client has mysql_native_password as default, there's no extra roundtrip |
Description |
New auth plugin:
* uses KDF * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? verify that if client has mysql_native_password as default, there's no extra roundtrip |
New auth plugin:
* uses KDF * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? reduce roundtrips: * set is as default * allow clients to provide the salt (--plugin-salt=XXX). if it's incorrect — connection fails. |
Description |
New auth plugin:
* uses KDF * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? reduce roundtrips: * set is as default * allow clients to provide the salt (--plugin-salt=XXX). if it's incorrect — connection fails. |
New auth plugin:
* uses KDF * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX). if it's incorrect — connection fails. |
Description |
New auth plugin:
* uses KDF * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX). if it's incorrect — connection fails. |
New auth plugin:
* uses KDF * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note |
Description |
New auth plugin:
* uses KDF * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note |
New auth plugin:
* uses KDF * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note |
Issue Type | Task [ 3 ] | New Feature [ 2 ] |
Component/s | Protocol [ 14604 ] |
Description |
New auth plugin:
* uses KDF * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note |
Assignee | Sergei Golubchik [ serg ] | Vladislav Vaintroub [ wlad ] |
Status | Open [ 1 ] | In Progress [ 3 ] |
Fix Version/s | 11.5 [ 29506 ] | |
Fix Version/s | 11.4 [ 29301 ] |
Description |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], |
Description |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET |
Description |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note h1. Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length) Login process, packet exchange 1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length. This is the only unencrypted message during entire exchange 2 . Client computes derived key from password and parameters: derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length) Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server 3. server decrypts ServerVerificationChallenge and sends ServerVerificationResponse = AES_ENCRYPT(XOR(server_scramble,client_scramble), derived_key)) 4. client looks that AES_DECRYPT(ServerVerificationResponse, derived_key) = XOR(server_scramble,client_scramble) . If they match, client could not verify the server, and error is reported. Client still has to prove it has the password, not just the derived key So it sends ClientEncryptedPassword message = AES_ENCRYPT(XOR(hash_func(password), XOR(server_scramble^client_scramble),derived_key) 5. Server verifies the client a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key) b) hashed_password= XOR(tmp, XOR(server_scramble^client_scramble)) c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length) and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys) Server sends OK or ERR packet |
Description |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note h1. Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length) Login process, packet exchange 1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length. This is the only unencrypted message during entire exchange 2 . Client computes derived key from password and parameters: derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length) Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server 3. server decrypts ServerVerificationChallenge and sends ServerVerificationResponse = AES_ENCRYPT(XOR(server_scramble,client_scramble), derived_key)) 4. client looks that AES_DECRYPT(ServerVerificationResponse, derived_key) = XOR(server_scramble,client_scramble) . If they match, client could not verify the server, and error is reported. Client still has to prove it has the password, not just the derived key So it sends ClientEncryptedPassword message = AES_ENCRYPT(XOR(hash_func(password), XOR(server_scramble^client_scramble),derived_key) 5. Server verifies the client a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key) b) hashed_password= XOR(tmp, XOR(server_scramble^client_scramble)) c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length) and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys) Server sends OK or ERR packet |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note h1. Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length) h2. Login process, packet exchange 1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length. This is the only unencrypted message during entire exchange 2 . Client computes derived key from password and parameters: derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length) Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server 3. server decrypts ServerVerificationChallenge and sends ServerVerificationResponse = AES_ENCRYPT(XOR(server_scramble,client_scramble), derived_key)) 4. client looks that AES_DECRYPT(ServerVerificationResponse, derived_key) = XOR(server_scramble,client_scramble) . If they match, client could not verify the server, and error is reported. Client still has to prove it has the password, not just the derived key So it sends ClientEncryptedPassword message = AES_ENCRYPT(XOR(hash_func(password), XOR(server_scramble^client_scramble),derived_key) 5. Server verifies the client a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key) b) hashed_password= XOR(tmp, XOR(server_scramble^client_scramble)) c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length) and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys) Server sends OK or ERR packet |
Description |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note h1. Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length) h2. Login process, packet exchange 1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length. This is the only unencrypted message during entire exchange 2 . Client computes derived key from password and parameters: derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length) Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server 3. server decrypts ServerVerificationChallenge and sends ServerVerificationResponse = AES_ENCRYPT(XOR(server_scramble,client_scramble), derived_key)) 4. client looks that AES_DECRYPT(ServerVerificationResponse, derived_key) = XOR(server_scramble,client_scramble) . If they match, client could not verify the server, and error is reported. Client still has to prove it has the password, not just the derived key So it sends ClientEncryptedPassword message = AES_ENCRYPT(XOR(hash_func(password), XOR(server_scramble^client_scramble),derived_key) 5. Server verifies the client a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key) b) hashed_password= XOR(tmp, XOR(server_scramble^client_scramble)) c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length) and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys) Server sends OK or ERR packet |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note h1. Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length) h2. Login process, packet exchange 1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length. This is the only unencrypted message during entire exchange 2 . Client computes derived key from password and parameters: derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length) Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server 3. server decrypts ServerVerificationChallenge and sends ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key)) 4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble). If they match, client could not verify the server, and error is reported. Client still has to prove it has the password, not just the derived key So it sends ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key) 5. Server verifies the client a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key) b) hashed_password=substr(tmp, hash_length) c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length) and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys) Server sends OK or ERR packet |
Description |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note h1. Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length) h2. Login process, packet exchange 1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length. This is the only unencrypted message during entire exchange 2 . Client computes derived key from password and parameters: derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length) Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server 3. server decrypts ServerVerificationChallenge and sends ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key)) 4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble). If they match, client could not verify the server, and error is reported. Client still has to prove it has the password, not just the derived key So it sends ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key) 5. Server verifies the client a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key) b) hashed_password=substr(tmp, hash_length) c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length) and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys) Server sends OK or ERR packet |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note h1. Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length) h2. Login process, packet exchange 1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length. This is the only unencrypted message during entire exchange 2 . Client computes derived key from password and parameters: derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length) Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server 3. server decrypts ServerVerificationChallenge and sends ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key)) 4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble). If they don't match, client could not verify the server, and error is reported. Client still has to prove it has the password, not just the derived key So it sends ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key) 5. Server verifies the client a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key) b) hashed_password=substr(tmp, hash_length) c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length) and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys) Server sends OK or ERR packet |
Remote Link | This issue links to "OWASP Password Storage Cheat Sheet (Web Link)" [ 36383 ] |
Status | In Progress [ 3 ] | Stalled [ 10000 ] |
Assignee | Vladislav Vaintroub [ wlad ] | Sergei Golubchik [ serg ] |
Assignee | Sergei Golubchik [ serg ] | Nikita Malyavin [ nikitamalyavin ] |
Status | Stalled [ 10000 ] | In Progress [ 3 ] |
Description |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note h1. Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length) h2. Login process, packet exchange 1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length. This is the only unencrypted message during entire exchange 2 . Client computes derived key from password and parameters: derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length) Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server 3. server decrypts ServerVerificationChallenge and sends ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key)) 4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble). If they don't match, client could not verify the server, and error is reported. Client still has to prove it has the password, not just the derived key So it sends ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key) 5. Server verifies the client a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key) b) hashed_password=substr(tmp, hash_length) c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length) and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys) Server sends OK or ERR packet |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note h1. Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length) {panel:title=first idea} h2. Login process, packet exchange 1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length. This is the only unencrypted message during entire exchange 2 . Client computes derived key from password and parameters: derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length) Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server 3. server decrypts ServerVerificationChallenge and sends ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key)) 4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble). If they don't match, client could not verify the server, and error is reported. Client still has to prove it has the password, not just the derived key So it sends ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key) 5. Server verifies the client a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key) b) hashed_password=substr(tmp, hash_length) c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length) and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys) Server sends OK or ERR packet {panel} |
Description |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note h1. Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length) {panel:title=first idea} h2. Login process, packet exchange 1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length. This is the only unencrypted message during entire exchange 2 . Client computes derived key from password and parameters: derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length) Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server 3. server decrypts ServerVerificationChallenge and sends ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key)) 4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble). If they don't match, client could not verify the server, and error is reported. Client still has to prove it has the password, not just the derived key So it sends ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key) 5. Server verifies the client a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key) b) hashed_password=substr(tmp, hash_length) c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length) and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys) Server sends OK or ERR packet {panel} |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note {panel:title=first idea|collapse} h1. Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length) h2. Login process, packet exchange 1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length. This is the only unencrypted message during entire exchange 2 . Client computes derived key from password and parameters: derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length) Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server 3. server decrypts ServerVerificationChallenge and sends ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key)) 4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble). If they don't match, client could not verify the server, and error is reported. Client still has to prove it has the password, not just the derived key So it sends ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key) 5. Server verifies the client a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key) b) hashed_password=substr(tmp, hash_length) c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length) and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys) Server sends OK or ERR packet {panel} |
Description |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note {panel:title=first idea|collapse} h1. Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length) h2. Login process, packet exchange 1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length. This is the only unencrypted message during entire exchange 2 . Client computes derived key from password and parameters: derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length) Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server 3. server decrypts ServerVerificationChallenge and sends ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key)) 4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble). If they don't match, client could not verify the server, and error is reported. Client still has to prove it has the password, not just the derived key So it sends ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key) 5. Server verifies the client a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key) b) hashed_password=substr(tmp, hash_length) c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length) and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys) Server sends OK or ERR packet {panel} |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note {panel:title=revised idea} h2. Password generation and storage * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), iteration count, salt, key_length, together with derived key = PBKDF2(func, password, salt, iteration_count, key_length) * number of iterations is a power of 2, greater than 9 * the algorithm is ed25519, "hash" is the public key generated using ed25519 from the PBKDF2(password) The authentication string, stored by the server, is {noformat} concat('P', conv(log2(iterations)-10, 10, 62), ':', base64(salt), ':', base64(hash)) {noformat} that e.g. {{P0:WW9sXaaL/o:vubFBzIrapbfHct1/J72dnUryz5VS7lA6XHH8sIx4TI}} * it consists of colon-separated fields * first field is 'P' (denotes KDF algorithm = PBKDF2) and the number of iterations, '0' means 1024, '1' means 2048, etc * then salt * then the password hash Let's call everything except the password hash the *ext-salt* in the example above it's {{P0:WW9sXaaL/o}} h2. Login process, packet exchange 1. Server sends the welcome packet with a 32-byte random scramble 2 . if the ext-salt was specified in the .my.cnf, the client skips to step 4, otherwise it sends the user name (and nothing else) to the server 3. Server sends the ext-salt to the client 4. Client sends the random 32-byte scramble, and the concat(server scramble, client scramble) ed25519-signed by a secret key generated from the PBKDF2(password, ext-salt) 5. Server replies with "ok" or "acces denied" {panel} {panel:title=first idea} h1. Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length) h2. Login process, packet exchange 1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length. This is the only unencrypted message during entire exchange 2 . Client computes derived key from password and parameters: derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length) Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server 3. server decrypts ServerVerificationChallenge and sends ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key)) 4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble). If they don't match, client could not verify the server, and error is reported. Client still has to prove it has the password, not just the derived key So it sends ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key) 5. Server verifies the client a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key) b) hashed_password=substr(tmp, hash_length) c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length) and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys) Server sends OK or ERR packet {panel} |
Description |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note {panel:title=revised idea} h2. Password generation and storage * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), iteration count, salt, key_length, together with derived key = PBKDF2(func, password, salt, iteration_count, key_length) * number of iterations is a power of 2, greater than 9 * the algorithm is ed25519, "hash" is the public key generated using ed25519 from the PBKDF2(password) The authentication string, stored by the server, is {noformat} concat('P', conv(log2(iterations)-10, 10, 62), ':', base64(salt), ':', base64(hash)) {noformat} that e.g. {{P0:WW9sXaaL/o:vubFBzIrapbfHct1/J72dnUryz5VS7lA6XHH8sIx4TI}} * it consists of colon-separated fields * first field is 'P' (denotes KDF algorithm = PBKDF2) and the number of iterations, '0' means 1024, '1' means 2048, etc * then salt * then the password hash Let's call everything except the password hash the *ext-salt* in the example above it's {{P0:WW9sXaaL/o}} h2. Login process, packet exchange 1. Server sends the welcome packet with a 32-byte random scramble 2 . if the ext-salt was specified in the .my.cnf, the client skips to step 4, otherwise it sends the user name (and nothing else) to the server 3. Server sends the ext-salt to the client 4. Client sends the random 32-byte scramble, and the concat(server scramble, client scramble) ed25519-signed by a secret key generated from the PBKDF2(password, ext-salt) 5. Server replies with "ok" or "acces denied" {panel} {panel:title=first idea} h1. Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length) h2. Login process, packet exchange 1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length. This is the only unencrypted message during entire exchange 2 . Client computes derived key from password and parameters: derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length) Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server 3. server decrypts ServerVerificationChallenge and sends ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key)) 4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble). If they don't match, client could not verify the server, and error is reported. Client still has to prove it has the password, not just the derived key So it sends ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key) 5. Server verifies the client a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key) b) hashed_password=substr(tmp, hash_length) c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length) and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys) Server sends OK or ERR packet {panel} |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note {panel:title=revised idea} h2. Password generation and storage * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), iteration count, salt, key_length, together with derived key = PBKDF2(func, password, salt, iteration_count, key_length) * number of iterations is a power of 2, greater than 9 * the algorithm is ed25519, "hash" is the public key generated using ed25519 from the PBKDF2(password) The authentication string, stored by the server, is {noformat} concat('P', conv(log2(iterations)-10, 10, 62), ':', base64(salt), ':', base64(hash)) {noformat} that e.g. {{P0:WW9sXaaL/o:vubFBzIrapbfHct1/J72dnUryz5VS7lA6XHH8sIx4TI}} * it consists of colon-separated fields * first field is 'P' (denotes KDF algorithm = PBKDF2) and the number of iterations, '0' means 1024, '1' means 2048, etc * then salt * then the password hash Let's call everything except the password hash the *ext-salt*, in the example above it's {{P0:WW9sXaaL/o}} h2. Login process, packet exchange 1. Server sends the welcome packet with a 32-byte random scramble 2 . if the ext-salt was specified in the .my.cnf, the client skips to step 4, otherwise it sends the user name (and nothing else) to the server 3. Server sends the ext-salt to the client 4. Client sends the random 32-byte scramble, and the concat(server scramble, client scramble) ed25519-signed by a secret key generated from the PBKDF2(password, ext-salt) 5. Server replies with "ok" or "acces denied" {panel} {panel:title=first idea} h1. Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length) h2. Login process, packet exchange 1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length. This is the only unencrypted message during entire exchange 2 . Client computes derived key from password and parameters: derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length) Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server 3. server decrypts ServerVerificationChallenge and sends ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key)) 4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble). If they don't match, client could not verify the server, and error is reported. Client still has to prove it has the password, not just the derived key So it sends ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key) 5. Server verifies the client a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key) b) hashed_password=substr(tmp, hash_length) c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length) and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys) Server sends OK or ERR packet {panel} |
Description |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note {panel:title=revised idea} h2. Password generation and storage * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), iteration count, salt, key_length, together with derived key = PBKDF2(func, password, salt, iteration_count, key_length) * number of iterations is a power of 2, greater than 9 * the algorithm is ed25519, "hash" is the public key generated using ed25519 from the PBKDF2(password) The authentication string, stored by the server, is {noformat} concat('P', conv(log2(iterations)-10, 10, 62), ':', base64(salt), ':', base64(hash)) {noformat} that e.g. {{P0:WW9sXaaL/o:vubFBzIrapbfHct1/J72dnUryz5VS7lA6XHH8sIx4TI}} * it consists of colon-separated fields * first field is 'P' (denotes KDF algorithm = PBKDF2) and the number of iterations, '0' means 1024, '1' means 2048, etc * then salt * then the password hash Let's call everything except the password hash the *ext-salt*, in the example above it's {{P0:WW9sXaaL/o}} h2. Login process, packet exchange 1. Server sends the welcome packet with a 32-byte random scramble 2 . if the ext-salt was specified in the .my.cnf, the client skips to step 4, otherwise it sends the user name (and nothing else) to the server 3. Server sends the ext-salt to the client 4. Client sends the random 32-byte scramble, and the concat(server scramble, client scramble) ed25519-signed by a secret key generated from the PBKDF2(password, ext-salt) 5. Server replies with "ok" or "acces denied" {panel} {panel:title=first idea} h1. Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length) h2. Login process, packet exchange 1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length. This is the only unencrypted message during entire exchange 2 . Client computes derived key from password and parameters: derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length) Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server 3. server decrypts ServerVerificationChallenge and sends ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key)) 4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble). If they don't match, client could not verify the server, and error is reported. Client still has to prove it has the password, not just the derived key So it sends ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key) 5. Server verifies the client a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key) b) hashed_password=substr(tmp, hash_length) c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length) and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys) Server sends OK or ERR packet {panel} |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note {panel:title=revised idea} h2. Password generation and storage * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), iteration count, salt, key_length, together with derived key = PBKDF2(func, password, salt, iteration_count, key_length) * number of iterations is a power of 2, greater than 9 * the algorithm is ed25519, "hash" is the public key generated using ed25519 from the PBKDF2(password) The authentication string, stored by the server, is {code:sql} concat('P', conv(log2(iterations)-10, 10, 62), ':', base64(salt), ':', base64(hash)) {code} that e.g. {{P0:WW9sXaaL/o:vubFBzIrapbfHct1/J72dnUryz5VS7lA6XHH8sIx4TI}} * it consists of colon-separated fields * first field is 'P' (denotes KDF algorithm = PBKDF2) and the number of iterations, '0' means 1024, '1' means 2048, etc * then salt * then the password hash Let's call everything except the password hash the *ext-salt*, in the example above it's {{P0:WW9sXaaL/o}} h2. Login process, packet exchange 1. Server sends the welcome packet with a 32-byte random scramble 2 . if the ext-salt was specified in the .my.cnf, the client skips to step 4, otherwise it sends the user name (and nothing else) to the server 3. Server sends the ext-salt to the client 4. Client sends the random 32-byte scramble, and the concat(server scramble, client scramble) ed25519-signed by a secret key generated from the PBKDF2(password, ext-salt) 5. Server replies with "ok" or "acces denied" {panel} {panel:title=first idea} h1. Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length) h2. Login process, packet exchange 1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length. This is the only unencrypted message during entire exchange 2 . Client computes derived key from password and parameters: derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length) Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server 3. server decrypts ServerVerificationChallenge and sends ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key)) 4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble). If they don't match, client could not verify the server, and error is reported. Client still has to prove it has the password, not just the derived key So it sends ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key) 5. Server verifies the client a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key) b) hashed_password=substr(tmp, hash_length) c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length) and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys) Server sends OK or ERR packet {panel} |
Status | In Progress [ 3 ] | Stalled [ 10000 ] |
Fix Version/s | 11.6 [ 29515 ] | |
Fix Version/s | 11.5 [ 29506 ] |
Status | Stalled [ 10000 ] | In Progress [ 3 ] |
Status | In Progress [ 3 ] | Stalled [ 10000 ] |
Status | Stalled [ 10000 ] | In Progress [ 3 ] |
Link | This issue is part of TODO-4765 [ TODO-4765 ] |
Attachment | noname [ 73630 ] |
Link | This issue relates to MDEV-12320 [ MDEV-12320 ] |
Description |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note {panel:title=revised idea} h2. Password generation and storage * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), iteration count, salt, key_length, together with derived key = PBKDF2(func, password, salt, iteration_count, key_length) * number of iterations is a power of 2, greater than 9 * the algorithm is ed25519, "hash" is the public key generated using ed25519 from the PBKDF2(password) The authentication string, stored by the server, is {code:sql} concat('P', conv(log2(iterations)-10, 10, 62), ':', base64(salt), ':', base64(hash)) {code} that e.g. {{P0:WW9sXaaL/o:vubFBzIrapbfHct1/J72dnUryz5VS7lA6XHH8sIx4TI}} * it consists of colon-separated fields * first field is 'P' (denotes KDF algorithm = PBKDF2) and the number of iterations, '0' means 1024, '1' means 2048, etc * then salt * then the password hash Let's call everything except the password hash the *ext-salt*, in the example above it's {{P0:WW9sXaaL/o}} h2. Login process, packet exchange 1. Server sends the welcome packet with a 32-byte random scramble 2 . if the ext-salt was specified in the .my.cnf, the client skips to step 4, otherwise it sends the user name (and nothing else) to the server 3. Server sends the ext-salt to the client 4. Client sends the random 32-byte scramble, and the concat(server scramble, client scramble) ed25519-signed by a secret key generated from the PBKDF2(password, ext-salt) 5. Server replies with "ok" or "acces denied" {panel} {panel:title=first idea} h1. Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length) h2. Login process, packet exchange 1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length. This is the only unencrypted message during entire exchange 2 . Client computes derived key from password and parameters: derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length) Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server 3. server decrypts ServerVerificationChallenge and sends ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key)) 4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble). If they don't match, client could not verify the server, and error is reported. Client still has to prove it has the password, not just the derived key So it sends ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key) 5. Server verifies the client a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key) b) hashed_password=substr(tmp, hash_length) c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length) and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys) Server sends OK or ERR packet {panel} |
New auth plugin:
* uses KDF (try to use what openssl provides) * salted * uses server- and client-side scrambles * set as default auth plugin * ed25519 based? (or try to use what openssl provides) * support old hashes? reduce roundtrips: * set as default (MDEV-12320) * allow clients to provide the salt (--plugin-salt=XXX) ** if it's incorrect — connection fails. ** PASSWORD() returns the salt in a Note {panel:title=revised idea} h2. Password generation and storage * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), iteration count, salt, key_length, together with derived key = PBKDF2(func, password, salt, iteration_count, key_length) * number of iterations is a power of 2, greater than 9 * the algorithm is ed25519, "hash" is the public key generated using ed25519 from the PBKDF2(password) The authentication string, stored by the server, is {code:sql} concat('P', conv(log2(iterations)-10, 10, 62), ':', base64(salt), ':', base64(hash)) {code} that e.g. {{P0:WW9sXaaL/o:vubFBzIrapbfHct1/J72dnUryz5VS7lA6XHH8sIx4TI}} * it consists of colon-separated fields * first field is 'P' (denotes KDF algorithm = PBKDF2) and the number of iterations, '0' means 1024, '1' means 2048, etc * then salt * then the password hash Let's call everything except the password hash the *ext-salt*, in the example above it's {{P0:WW9sXaaL/o}} h2. Login process, packet exchange 1. Server sends the welcome packet with a 32-byte random scramble 2 . if the ext-salt was specified in the .my.cnf, the client skips to step 4, otherwise it sends the user name (and nothing else) to the server 3. Server sends the ext-salt to the client 4. Client sends the random 32-byte scramble, and the concat(server scramble, client scramble) ed25519-signed by a secret key generated from the PBKDF2(password, ext-salt) 5. Server replies with "ok" or "acces denied" {panel} {panel:title=first idea} h1. Rough idea * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length) h2. Login process, packet exchange 1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length. This is the only unencrypted message during entire exchange 2 . Client computes derived key from password and parameters: derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length) Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server 3. server decrypts ServerVerificationChallenge and sends ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key)) 4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble). If they don't match, client could not verify the server, and error is reported. Client still has to prove it has the password, not just the derived key So it sends ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key) 5. Server verifies the client a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key) b) hashed_password=substr(tmp, hash_length) c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length) and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys) Server sends OK or ERR packet {panel} |
Assignee | Nikita Malyavin [ nikitamalyavin ] | Sergei Golubchik [ serg ] |
Status | In Progress [ 3 ] | Stalled [ 10000 ] |
Status | Stalled [ 10000 ] | In Testing [ 10301 ] |
Assignee | Sergei Golubchik [ serg ] | Ramesh Sivaraman [ JIRAUSER48189 ] |
Link |
This issue causes |
Labels | Preview_11.6 |
Assignee | Ramesh Sivaraman [ JIRAUSER48189 ] | Nikita Malyavin [ nikitamalyavin ] |
Status | In Testing [ 10301 ] | Stalled [ 10000 ] |
Summary | new auth plugin | PARSEC Authentication Plugin |
Remote Link | This issue links to "Documentation (Web Link)" [ 37036 ] |
Link |
This issue causes |
Link |
This issue causes |
Link | This issue relates to MDEV-34744 [ MDEV-34744 ] |
Fix Version/s | 11.6.1 [ 29847 ] | |
Fix Version/s | 11.6 [ 29515 ] | |
Resolution | Fixed [ 1 ] | |
Status | Stalled [ 10000 ] | Closed [ 6 ] |
Link | This issue relates to MDEV-34846 [ MDEV-34846 ] |
Link |
This issue relates to |
Link |
This issue causes |
Link |
This issue relates to |
Link | This issue relates to MDEV-34933 [ MDEV-34933 ] |
Link | This issue blocks MENT-2142 [ MENT-2142 ] |
Link | This issue is blocked by MDEV-35254 [ MDEV-35254 ] |
Link | This issue is blocked by MDEV-35254 [ MDEV-35254 ] |
Link | This issue causes MDEV-35254 [ MDEV-35254 ] |
Link |
This issue causes |
The estimate is updated with regard to the roadmap, which is set below: