Details

    Description

      New auth plugin:

      • uses KDF (try to use what openssl provides)
      • salted
      • uses server- and client-side scrambles
      • set as default auth plugin
      • ed25519 based? (or try to use what openssl provides)
      • support old hashes?

      reduce roundtrips:

      • set as default (MDEV-12320)
      • allow clients to provide the salt (--plugin-salt=XXX)
        • if it's incorrect — connection fails.
        • PASSWORD() returns the salt in a Note
      revised idea

      Password generation and storage

      • the KDF function is pbkdf2 (supported by everything, including windows native, Java, javascript, PHP, .NET
      • parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), iteration count, salt, key_length, together with derived key = PBKDF2(func, password, salt, iteration_count, key_length)
      • number of iterations is a power of 2, greater than 9
      • the algorithm is ed25519, "hash" is the public key generated using ed25519 from the PBKDF2(password)

      The authentication string, stored by the server, is

      concat('P', conv(log2(iterations)-10, 10, 62), ':', base64(salt), ':', base64(hash))
      

      that e.g. P0:WW9sXaaL/o:vubFBzIrapbfHct1/J72dnUryz5VS7lA6XHH8sIx4TI

      • it consists of colon-separated fields
      • first field is 'P' (denotes KDF algorithm = PBKDF2) and the number of iterations, '0' means 1024, '1' means 2048, etc
      • then salt
      • then the password hash

      Let's call everything except the password hash the ext-salt, in the example above it's P0:WW9sXaaL/o

      Login process, packet exchange

      1. Server sends the welcome packet with a 32-byte random scramble

      2 . if the ext-salt was specified in the .my.cnf, the client skips to step 4, otherwise it sends the user name (and nothing else) to the server

      3. Server sends the ext-salt to the client

      4. Client sends the random 32-byte scramble, and the concat(server scramble, client scramble) ed25519-signed by a secret key generated from the PBKDF2(password, ext-salt)

      5. Server replies with "ok" or "acces denied"

      first idea

      Rough idea

      • the KDF function is pbkdf2 (supported by everything, including windows native, Java, javascript, PHP, .NET
      • parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length)

      Login process, packet exchange

      1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length.
      This is the only unencrypted message during entire exchange

      2 . Client computes derived key from password and parameters:
      derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length)
      Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server

      3. server decrypts ServerVerificationChallenge and sends

      ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key))

      4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble).
      If they don't match, client could not verify the server, and error is reported.

      Client still has to prove it has the password, not just the derived key
      So it sends
      ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key)

      5. Server verifies the client
      a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key)
      b) hashed_password=substr(tmp, hash_length)
      c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length)
      and compares derived_key and derived_key2 for equality, (due to the HMAC_collisions property of pbkdf2, password and hash_func(password) would produce the same keys)
      Server sends OK or ERR packet

      Attachments

        Issue Links

          Activity

            serg Sergei Golubchik created issue -
            serg Sergei Golubchik made changes -
            Field Original Value New Value
            Description New auth plugin:
            * uses KDF
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25119 based?
            New auth plugin:
            * uses KDF
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25119 based?

            verify that if client has mysql_native_password as default, there's no extra roundtrip
            serg Sergei Golubchik made changes -
            Description New auth plugin:
            * uses KDF
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25119 based?

            verify that if client has mysql_native_password as default, there's no extra roundtrip
            New auth plugin:
            * uses KDF
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based?

            verify that if client has mysql_native_password as default, there's no extra roundtrip
            serg Sergei Golubchik made changes -
            Description New auth plugin:
            * uses KDF
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based?

            verify that if client has mysql_native_password as default, there's no extra roundtrip
            New auth plugin:
            * uses KDF
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based?

            reduce roundtrips:
            * set is as default
            * allow clients to provide the salt (--plugin-salt=XXX). if it's incorrect — connection fails.
            serg Sergei Golubchik made changes -
            Description New auth plugin:
            * uses KDF
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based?

            reduce roundtrips:
            * set is as default
            * allow clients to provide the salt (--plugin-salt=XXX). if it's incorrect — connection fails.
            New auth plugin:
            * uses KDF
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX). if it's incorrect — connection fails.
            serg Sergei Golubchik made changes -
            Description New auth plugin:
            * uses KDF
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX). if it's incorrect — connection fails.
            New auth plugin:
            * uses KDF
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note
            serg Sergei Golubchik made changes -
            Description New auth plugin:
            * uses KDF
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note
            New auth plugin:
            * uses KDF
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based?
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note
            serg Sergei Golubchik made changes -
            Issue Type Task [ 3 ] New Feature [ 2 ]
            serg Sergei Golubchik made changes -
            Component/s Protocol [ 14604 ]
            serg Sergei Golubchik made changes -
            Description New auth plugin:
            * uses KDF
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based?
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note
            New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note
            serg Sergei Golubchik made changes -
            Assignee Sergei Golubchik [ serg ] Vladislav Vaintroub [ wlad ]
            wlad Vladislav Vaintroub made changes -
            Status Open [ 1 ] In Progress [ 3 ]
            serg Sergei Golubchik made changes -
            Fix Version/s 11.5 [ 29506 ]
            Fix Version/s 11.4 [ 29301 ]
            wlad Vladislav Vaintroub made changes -
            Description New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note
            New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note


            Rough idea
            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2],
            wlad Vladislav Vaintroub made changes -
            Description New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note


            Rough idea
            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2],
            New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note


            Rough idea
            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            wlad Vladislav Vaintroub made changes -
            Description New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note


            Rough idea
            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note


            h1. Rough idea

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length)

            Login process, packet exchange

            1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length.
                This is the only unencrypted message during entire exchange
               
            2 . Client computes derived key from password and parameters:
                 derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length)
                 Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server

            3. server decrypts ServerVerificationChallenge and sends
                 
                 ServerVerificationResponse = AES_ENCRYPT(XOR(server_scramble,client_scramble), derived_key))

            4. client looks that AES_DECRYPT(ServerVerificationResponse, derived_key) = XOR(server_scramble,client_scramble) .
                 If they match, client could not verify the server, and error is reported.

                Client still has to prove it has the password, not just the derived key
                 So it sends
                 ClientEncryptedPassword message = AES_ENCRYPT(XOR(hash_func(password), XOR(server_scramble^client_scramble),derived_key)

            5. Server verifies the client
                a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key)
                b) hashed_password= XOR(tmp, XOR(server_scramble^client_scramble))
                c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length)
                and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys)
               Server sends OK or ERR packet

              


            wlad Vladislav Vaintroub made changes -
            Description New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note


            h1. Rough idea

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length)

            Login process, packet exchange

            1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length.
                This is the only unencrypted message during entire exchange
               
            2 . Client computes derived key from password and parameters:
                 derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length)
                 Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server

            3. server decrypts ServerVerificationChallenge and sends
                 
                 ServerVerificationResponse = AES_ENCRYPT(XOR(server_scramble,client_scramble), derived_key))

            4. client looks that AES_DECRYPT(ServerVerificationResponse, derived_key) = XOR(server_scramble,client_scramble) .
                 If they match, client could not verify the server, and error is reported.

                Client still has to prove it has the password, not just the derived key
                 So it sends
                 ClientEncryptedPassword message = AES_ENCRYPT(XOR(hash_func(password), XOR(server_scramble^client_scramble),derived_key)

            5. Server verifies the client
                a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key)
                b) hashed_password= XOR(tmp, XOR(server_scramble^client_scramble))
                c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length)
                and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys)
               Server sends OK or ERR packet

              


            New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note


            h1. Rough idea

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length)

            h2. Login process, packet exchange

            1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length.
                This is the only unencrypted message during entire exchange
               
            2 . Client computes derived key from password and parameters:
                 derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length)
                 Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server

            3. server decrypts ServerVerificationChallenge and sends
                 
                 ServerVerificationResponse = AES_ENCRYPT(XOR(server_scramble,client_scramble), derived_key))

            4. client looks that AES_DECRYPT(ServerVerificationResponse, derived_key) = XOR(server_scramble,client_scramble) .
                 If they match, client could not verify the server, and error is reported.

                Client still has to prove it has the password, not just the derived key
                 So it sends
                 ClientEncryptedPassword message = AES_ENCRYPT(XOR(hash_func(password), XOR(server_scramble^client_scramble),derived_key)

            5. Server verifies the client
                a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key)
                b) hashed_password= XOR(tmp, XOR(server_scramble^client_scramble))
                c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length)
                and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys)
               Server sends OK or ERR packet

              


            wlad Vladislav Vaintroub made changes -
            Description New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note


            h1. Rough idea

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length)

            h2. Login process, packet exchange

            1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length.
                This is the only unencrypted message during entire exchange
               
            2 . Client computes derived key from password and parameters:
                 derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length)
                 Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server

            3. server decrypts ServerVerificationChallenge and sends
                 
                 ServerVerificationResponse = AES_ENCRYPT(XOR(server_scramble,client_scramble), derived_key))

            4. client looks that AES_DECRYPT(ServerVerificationResponse, derived_key) = XOR(server_scramble,client_scramble) .
                 If they match, client could not verify the server, and error is reported.

                Client still has to prove it has the password, not just the derived key
                 So it sends
                 ClientEncryptedPassword message = AES_ENCRYPT(XOR(hash_func(password), XOR(server_scramble^client_scramble),derived_key)

            5. Server verifies the client
                a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key)
                b) hashed_password= XOR(tmp, XOR(server_scramble^client_scramble))
                c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length)
                and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys)
               Server sends OK or ERR packet

              


            New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note


            h1. Rough idea

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length)

            h2. Login process, packet exchange

            1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length.
                This is the only unencrypted message during entire exchange
               
            2 . Client computes derived key from password and parameters:
                 derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length)
                 Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server

            3. server decrypts ServerVerificationChallenge and sends
                 
                 ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key))

            4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble).
                 If they match, client could not verify the server, and error is reported.

                Client still has to prove it has the password, not just the derived key
                 So it sends
                 ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key)

            5. Server verifies the client
                a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key)
                b) hashed_password=substr(tmp, hash_length)
                c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length)
                and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys)
               Server sends OK or ERR packet

              


            serg Sergei Golubchik made changes -
            Description New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note


            h1. Rough idea

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length)

            h2. Login process, packet exchange

            1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length.
                This is the only unencrypted message during entire exchange
               
            2 . Client computes derived key from password and parameters:
                 derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length)
                 Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server

            3. server decrypts ServerVerificationChallenge and sends
                 
                 ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key))

            4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble).
                 If they match, client could not verify the server, and error is reported.

                Client still has to prove it has the password, not just the derived key
                 So it sends
                 ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key)

            5. Server verifies the client
                a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key)
                b) hashed_password=substr(tmp, hash_length)
                c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length)
                and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys)
               Server sends OK or ERR packet

              


            New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note


            h1. Rough idea

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length)

            h2. Login process, packet exchange

            1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length.
                This is the only unencrypted message during entire exchange
               
            2 . Client computes derived key from password and parameters:
                 derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length)
                 Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server

            3. server decrypts ServerVerificationChallenge and sends
                 
                 ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key))

            4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble).
                 If they don't match, client could not verify the server, and error is reported.

                Client still has to prove it has the password, not just the derived key
                 So it sends
                 ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key)

            5. Server verifies the client
                a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key)
                b) hashed_password=substr(tmp, hash_length)
                c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length)
                and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys)
               Server sends OK or ERR packet

              


            danblack Daniel Black made changes -
            serg Sergei Golubchik made changes -
            Status In Progress [ 3 ] Stalled [ 10000 ]
            serg Sergei Golubchik made changes -
            Assignee Vladislav Vaintroub [ wlad ] Sergei Golubchik [ serg ]
            serg Sergei Golubchik made changes -
            Assignee Sergei Golubchik [ serg ] Nikita Malyavin [ nikitamalyavin ]
            nikitamalyavin Nikita Malyavin made changes -
            Status Stalled [ 10000 ] In Progress [ 3 ]
            serg Sergei Golubchik made changes -
            Description New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note


            h1. Rough idea

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length)

            h2. Login process, packet exchange

            1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length.
                This is the only unencrypted message during entire exchange
               
            2 . Client computes derived key from password and parameters:
                 derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length)
                 Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server

            3. server decrypts ServerVerificationChallenge and sends
                 
                 ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key))

            4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble).
                 If they don't match, client could not verify the server, and error is reported.

                Client still has to prove it has the password, not just the derived key
                 So it sends
                 ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key)

            5. Server verifies the client
                a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key)
                b) hashed_password=substr(tmp, hash_length)
                c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length)
                and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys)
               Server sends OK or ERR packet

              


            New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note

            h1. Rough idea

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length)

            {panel:title=first idea}

            h2. Login process, packet exchange

            1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length.
                This is the only unencrypted message during entire exchange
               
            2 . Client computes derived key from password and parameters:
                 derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length)
                 Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server

            3. server decrypts ServerVerificationChallenge and sends
                 
                 ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key))

            4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble).
                 If they don't match, client could not verify the server, and error is reported.

                Client still has to prove it has the password, not just the derived key
                 So it sends
                 ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key)

            5. Server verifies the client
                a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key)
                b) hashed_password=substr(tmp, hash_length)
                c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length)
                and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys)
               Server sends OK or ERR packet
            {panel}


            serg Sergei Golubchik made changes -
            Description New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note

            h1. Rough idea

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length)

            {panel:title=first idea}

            h2. Login process, packet exchange

            1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length.
                This is the only unencrypted message during entire exchange
               
            2 . Client computes derived key from password and parameters:
                 derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length)
                 Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server

            3. server decrypts ServerVerificationChallenge and sends
                 
                 ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key))

            4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble).
                 If they don't match, client could not verify the server, and error is reported.

                Client still has to prove it has the password, not just the derived key
                 So it sends
                 ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key)

            5. Server verifies the client
                a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key)
                b) hashed_password=substr(tmp, hash_length)
                c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length)
                and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys)
               Server sends OK or ERR packet
            {panel}


            New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note

            {panel:title=first idea|collapse}
            h1. Rough idea

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length)

            h2. Login process, packet exchange

            1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length.
                This is the only unencrypted message during entire exchange
               
            2 . Client computes derived key from password and parameters:
                 derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length)
                 Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server

            3. server decrypts ServerVerificationChallenge and sends
                 
                 ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key))

            4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble).
                 If they don't match, client could not verify the server, and error is reported.

                Client still has to prove it has the password, not just the derived key
                 So it sends
                 ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key)

            5. Server verifies the client
                a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key)
                b) hashed_password=substr(tmp, hash_length)
                c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length)
                and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys)
               Server sends OK or ERR packet
            {panel}


            serg Sergei Golubchik made changes -
            Description New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note

            {panel:title=first idea|collapse}
            h1. Rough idea

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length)

            h2. Login process, packet exchange

            1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length.
                This is the only unencrypted message during entire exchange
               
            2 . Client computes derived key from password and parameters:
                 derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length)
                 Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server

            3. server decrypts ServerVerificationChallenge and sends
                 
                 ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key))

            4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble).
                 If they don't match, client could not verify the server, and error is reported.

                Client still has to prove it has the password, not just the derived key
                 So it sends
                 ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key)

            5. Server verifies the client
                a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key)
                b) hashed_password=substr(tmp, hash_length)
                c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length)
                and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys)
               Server sends OK or ERR packet
            {panel}


            New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note

            {panel:title=revised idea}
            h2. Password generation and storage

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), iteration count, salt, key_length, together with derived key = PBKDF2(func, password, salt, iteration_count, key_length)
            * number of iterations is a power of 2, greater than 9
            * the algorithm is ed25519, "hash" is the public key generated using ed25519 from the PBKDF2(password)

            The authentication string, stored by the server, is
            {noformat}
            concat('P', conv(log2(iterations)-10, 10, 62), ':', base64(salt), ':', base64(hash))
            {noformat}
            that e.g. {{P0:WW9sXaaL/o:vubFBzIrapbfHct1/J72dnUryz5VS7lA6XHH8sIx4TI}}
            * it consists of colon-separated fields
            * first field is 'P' (denotes KDF algorithm = PBKDF2) and the number of iterations, '0' means 1024, '1' means 2048, etc
            * then salt
            * then the password hash

            Let's call everything except the password hash the *ext-salt* in the example above it's {{P0:WW9sXaaL/o}}

            h2. Login process, packet exchange

            1. Server sends the welcome packet with a 32-byte random scramble
               
            2 . if the ext-salt was specified in the .my.cnf, the client skips to step 4, otherwise it sends the user name (and nothing else) to the server

            3. Server sends the ext-salt to the client

            4. Client sends the random 32-byte scramble, and the concat(server scramble, client scramble) ed25519-signed by a secret key generated from the PBKDF2(password, ext-salt)

            5. Server replies with "ok" or "acces denied"
            {panel}

            {panel:title=first idea}
            h1. Rough idea

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length)

            h2. Login process, packet exchange

            1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length.
                This is the only unencrypted message during entire exchange
               
            2 . Client computes derived key from password and parameters:
                 derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length)
                 Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server

            3. server decrypts ServerVerificationChallenge and sends
                 
                 ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key))

            4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble).
                 If they don't match, client could not verify the server, and error is reported.

                Client still has to prove it has the password, not just the derived key
                 So it sends
                 ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key)

            5. Server verifies the client
                a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key)
                b) hashed_password=substr(tmp, hash_length)
                c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length)
                and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys)
               Server sends OK or ERR packet
            {panel}
            serg Sergei Golubchik made changes -
            Description New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note

            {panel:title=revised idea}
            h2. Password generation and storage

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), iteration count, salt, key_length, together with derived key = PBKDF2(func, password, salt, iteration_count, key_length)
            * number of iterations is a power of 2, greater than 9
            * the algorithm is ed25519, "hash" is the public key generated using ed25519 from the PBKDF2(password)

            The authentication string, stored by the server, is
            {noformat}
            concat('P', conv(log2(iterations)-10, 10, 62), ':', base64(salt), ':', base64(hash))
            {noformat}
            that e.g. {{P0:WW9sXaaL/o:vubFBzIrapbfHct1/J72dnUryz5VS7lA6XHH8sIx4TI}}
            * it consists of colon-separated fields
            * first field is 'P' (denotes KDF algorithm = PBKDF2) and the number of iterations, '0' means 1024, '1' means 2048, etc
            * then salt
            * then the password hash

            Let's call everything except the password hash the *ext-salt* in the example above it's {{P0:WW9sXaaL/o}}

            h2. Login process, packet exchange

            1. Server sends the welcome packet with a 32-byte random scramble
               
            2 . if the ext-salt was specified in the .my.cnf, the client skips to step 4, otherwise it sends the user name (and nothing else) to the server

            3. Server sends the ext-salt to the client

            4. Client sends the random 32-byte scramble, and the concat(server scramble, client scramble) ed25519-signed by a secret key generated from the PBKDF2(password, ext-salt)

            5. Server replies with "ok" or "acces denied"
            {panel}

            {panel:title=first idea}
            h1. Rough idea

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length)

            h2. Login process, packet exchange

            1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length.
                This is the only unencrypted message during entire exchange
               
            2 . Client computes derived key from password and parameters:
                 derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length)
                 Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server

            3. server decrypts ServerVerificationChallenge and sends
                 
                 ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key))

            4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble).
                 If they don't match, client could not verify the server, and error is reported.

                Client still has to prove it has the password, not just the derived key
                 So it sends
                 ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key)

            5. Server verifies the client
                a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key)
                b) hashed_password=substr(tmp, hash_length)
                c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length)
                and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys)
               Server sends OK or ERR packet
            {panel}
            New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note

            {panel:title=revised idea}
            h2. Password generation and storage

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), iteration count, salt, key_length, together with derived key = PBKDF2(func, password, salt, iteration_count, key_length)
            * number of iterations is a power of 2, greater than 9
            * the algorithm is ed25519, "hash" is the public key generated using ed25519 from the PBKDF2(password)

            The authentication string, stored by the server, is
            {noformat}
            concat('P', conv(log2(iterations)-10, 10, 62), ':', base64(salt), ':', base64(hash))
            {noformat}
            that e.g. {{P0:WW9sXaaL/o:vubFBzIrapbfHct1/J72dnUryz5VS7lA6XHH8sIx4TI}}
            * it consists of colon-separated fields
            * first field is 'P' (denotes KDF algorithm = PBKDF2) and the number of iterations, '0' means 1024, '1' means 2048, etc
            * then salt
            * then the password hash

            Let's call everything except the password hash the *ext-salt*, in the example above it's {{P0:WW9sXaaL/o}}

            h2. Login process, packet exchange

            1. Server sends the welcome packet with a 32-byte random scramble
               
            2 . if the ext-salt was specified in the .my.cnf, the client skips to step 4, otherwise it sends the user name (and nothing else) to the server

            3. Server sends the ext-salt to the client

            4. Client sends the random 32-byte scramble, and the concat(server scramble, client scramble) ed25519-signed by a secret key generated from the PBKDF2(password, ext-salt)

            5. Server replies with "ok" or "acces denied"
            {panel}

            {panel:title=first idea}
            h1. Rough idea

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length)

            h2. Login process, packet exchange

            1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length.
                This is the only unencrypted message during entire exchange
               
            2 . Client computes derived key from password and parameters:
                 derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length)
                 Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server

            3. server decrypts ServerVerificationChallenge and sends
                 
                 ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key))

            4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble).
                 If they don't match, client could not verify the server, and error is reported.

                Client still has to prove it has the password, not just the derived key
                 So it sends
                 ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key)

            5. Server verifies the client
                a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key)
                b) hashed_password=substr(tmp, hash_length)
                c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length)
                and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys)
               Server sends OK or ERR packet
            {panel}
            serg Sergei Golubchik made changes -
            Description New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note

            {panel:title=revised idea}
            h2. Password generation and storage

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), iteration count, salt, key_length, together with derived key = PBKDF2(func, password, salt, iteration_count, key_length)
            * number of iterations is a power of 2, greater than 9
            * the algorithm is ed25519, "hash" is the public key generated using ed25519 from the PBKDF2(password)

            The authentication string, stored by the server, is
            {noformat}
            concat('P', conv(log2(iterations)-10, 10, 62), ':', base64(salt), ':', base64(hash))
            {noformat}
            that e.g. {{P0:WW9sXaaL/o:vubFBzIrapbfHct1/J72dnUryz5VS7lA6XHH8sIx4TI}}
            * it consists of colon-separated fields
            * first field is 'P' (denotes KDF algorithm = PBKDF2) and the number of iterations, '0' means 1024, '1' means 2048, etc
            * then salt
            * then the password hash

            Let's call everything except the password hash the *ext-salt*, in the example above it's {{P0:WW9sXaaL/o}}

            h2. Login process, packet exchange

            1. Server sends the welcome packet with a 32-byte random scramble
               
            2 . if the ext-salt was specified in the .my.cnf, the client skips to step 4, otherwise it sends the user name (and nothing else) to the server

            3. Server sends the ext-salt to the client

            4. Client sends the random 32-byte scramble, and the concat(server scramble, client scramble) ed25519-signed by a secret key generated from the PBKDF2(password, ext-salt)

            5. Server replies with "ok" or "acces denied"
            {panel}

            {panel:title=first idea}
            h1. Rough idea

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length)

            h2. Login process, packet exchange

            1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length.
                This is the only unencrypted message during entire exchange
               
            2 . Client computes derived key from password and parameters:
                 derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length)
                 Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server

            3. server decrypts ServerVerificationChallenge and sends
                 
                 ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key))

            4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble).
                 If they don't match, client could not verify the server, and error is reported.

                Client still has to prove it has the password, not just the derived key
                 So it sends
                 ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key)

            5. Server verifies the client
                a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key)
                b) hashed_password=substr(tmp, hash_length)
                c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length)
                and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys)
               Server sends OK or ERR packet
            {panel}
            New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note

            {panel:title=revised idea}
            h2. Password generation and storage

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), iteration count, salt, key_length, together with derived key = PBKDF2(func, password, salt, iteration_count, key_length)
            * number of iterations is a power of 2, greater than 9
            * the algorithm is ed25519, "hash" is the public key generated using ed25519 from the PBKDF2(password)

            The authentication string, stored by the server, is
            {code:sql}
            concat('P', conv(log2(iterations)-10, 10, 62), ':', base64(salt), ':', base64(hash))
            {code}
            that e.g. {{P0:WW9sXaaL/o:vubFBzIrapbfHct1/J72dnUryz5VS7lA6XHH8sIx4TI}}
            * it consists of colon-separated fields
            * first field is 'P' (denotes KDF algorithm = PBKDF2) and the number of iterations, '0' means 1024, '1' means 2048, etc
            * then salt
            * then the password hash

            Let's call everything except the password hash the *ext-salt*, in the example above it's {{P0:WW9sXaaL/o}}

            h2. Login process, packet exchange

            1. Server sends the welcome packet with a 32-byte random scramble
               
            2 . if the ext-salt was specified in the .my.cnf, the client skips to step 4, otherwise it sends the user name (and nothing else) to the server

            3. Server sends the ext-salt to the client

            4. Client sends the random 32-byte scramble, and the concat(server scramble, client scramble) ed25519-signed by a secret key generated from the PBKDF2(password, ext-salt)

            5. Server replies with "ok" or "acces denied"
            {panel}

            {panel:title=first idea}
            h1. Rough idea

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length)

            h2. Login process, packet exchange

            1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length.
                This is the only unencrypted message during entire exchange
               
            2 . Client computes derived key from password and parameters:
                 derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length)
                 Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server

            3. server decrypts ServerVerificationChallenge and sends
                 
                 ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key))

            4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble).
                 If they don't match, client could not verify the server, and error is reported.

                Client still has to prove it has the password, not just the derived key
                 So it sends
                 ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key)

            5. Server verifies the client
                a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key)
                b) hashed_password=substr(tmp, hash_length)
                c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length)
                and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys)
               Server sends OK or ERR packet
            {panel}
            nikitamalyavin Nikita Malyavin made changes -
            Status In Progress [ 3 ] Stalled [ 10000 ]
            ralf.gebhardt Ralf Gebhardt made changes -
            Fix Version/s 11.6 [ 29515 ]
            Fix Version/s 11.5 [ 29506 ]
            nikitamalyavin Nikita Malyavin made changes -
            Status Stalled [ 10000 ] In Progress [ 3 ]
            nikitamalyavin Nikita Malyavin made changes -
            Status In Progress [ 3 ] Stalled [ 10000 ]
            nikitamalyavin Nikita Malyavin added a comment - - edited

            The estimate is updated with regard to the roadmap, which is set below:

            • MVP
            • Set as default plugin
            • ➡️ Make use of system's crypto provider
            • Reduce roundtrips with ext-salt provided through client's config
            nikitamalyavin Nikita Malyavin added a comment - - edited The estimate is updated with regard to the roadmap, which is set below: MVP Set as default plugin ➡️ Make use of system's crypto provider Reduce roundtrips with ext-salt provided through client's config
            nikitamalyavin Nikita Malyavin made changes -
            Status Stalled [ 10000 ] In Progress [ 3 ]
            serg Sergei Golubchik made changes -
            markus makela markus makela made changes -
            markus makela markus makela added a comment - - edited

            Would it be possible to (eventually) document the authentication protocol here? https://mariadb.com/kb/en/connection/#plugin-list

            markus makela markus makela added a comment - - edited Would it be possible to (eventually) document the authentication protocol here? https://mariadb.com/kb/en/connection/#plugin-list

            It should!

            nikitamalyavin Nikita Malyavin added a comment - It should!
            nikitamalyavin Nikita Malyavin made changes -
            Attachment noname [ 73630 ]
            serg Sergei Golubchik made changes -
            serg Sergei Golubchik made changes -
            Description New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note

            {panel:title=revised idea}
            h2. Password generation and storage

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), iteration count, salt, key_length, together with derived key = PBKDF2(func, password, salt, iteration_count, key_length)
            * number of iterations is a power of 2, greater than 9
            * the algorithm is ed25519, "hash" is the public key generated using ed25519 from the PBKDF2(password)

            The authentication string, stored by the server, is
            {code:sql}
            concat('P', conv(log2(iterations)-10, 10, 62), ':', base64(salt), ':', base64(hash))
            {code}
            that e.g. {{P0:WW9sXaaL/o:vubFBzIrapbfHct1/J72dnUryz5VS7lA6XHH8sIx4TI}}
            * it consists of colon-separated fields
            * first field is 'P' (denotes KDF algorithm = PBKDF2) and the number of iterations, '0' means 1024, '1' means 2048, etc
            * then salt
            * then the password hash

            Let's call everything except the password hash the *ext-salt*, in the example above it's {{P0:WW9sXaaL/o}}

            h2. Login process, packet exchange

            1. Server sends the welcome packet with a 32-byte random scramble
               
            2 . if the ext-salt was specified in the .my.cnf, the client skips to step 4, otherwise it sends the user name (and nothing else) to the server

            3. Server sends the ext-salt to the client

            4. Client sends the random 32-byte scramble, and the concat(server scramble, client scramble) ed25519-signed by a secret key generated from the PBKDF2(password, ext-salt)

            5. Server replies with "ok" or "acces denied"
            {panel}

            {panel:title=first idea}
            h1. Rough idea

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length)

            h2. Login process, packet exchange

            1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length.
                This is the only unencrypted message during entire exchange
               
            2 . Client computes derived key from password and parameters:
                 derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length)
                 Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server

            3. server decrypts ServerVerificationChallenge and sends
                 
                 ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key))

            4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble).
                 If they don't match, client could not verify the server, and error is reported.

                Client still has to prove it has the password, not just the derived key
                 So it sends
                 ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key)

            5. Server verifies the client
                a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key)
                b) hashed_password=substr(tmp, hash_length)
                c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length)
                and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys)
               Server sends OK or ERR packet
            {panel}
            New auth plugin:
            * uses KDF (try to use what openssl provides)
            * salted
            * uses server- and client-side scrambles
            * set as default auth plugin
            * ed25519 based? (or try to use what openssl provides)
            * support old hashes?

            reduce roundtrips:
            * set as default (MDEV-12320)
            * allow clients to provide the salt (--plugin-salt=XXX)
            ** if it's incorrect — connection fails.
            ** PASSWORD() returns the salt in a Note

            {panel:title=revised idea}
            h2. Password generation and storage

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), iteration count, salt, key_length, together with derived key = PBKDF2(func, password, salt, iteration_count, key_length)
            * number of iterations is a power of 2, greater than 9
            * the algorithm is ed25519, "hash" is the public key generated using ed25519 from the PBKDF2(password)

            The authentication string, stored by the server, is
            {code:sql}
            concat('P', conv(log2(iterations)-10, 10, 62), ':', base64(salt), ':', base64(hash))
            {code}
            that e.g. {{P0:WW9sXaaL/o:vubFBzIrapbfHct1/J72dnUryz5VS7lA6XHH8sIx4TI}}
            * it consists of colon-separated fields
            * first field is 'P' (denotes KDF algorithm = PBKDF2) and the number of iterations, '0' means 1024, '1' means 2048, etc
            * then salt
            * then the password hash

            Let's call everything except the password hash the *ext-salt*, in the example above it's {{P0:WW9sXaaL/o}}

            h2. Login process, packet exchange

            1. Server sends the welcome packet with a 32-byte random scramble
               
            2 . if the ext-salt was specified in the .my.cnf, the client skips to step 4, otherwise it sends the user name (and nothing else) to the server

            3. Server sends the ext-salt to the client

            4. Client sends the random 32-byte scramble, and the concat(server scramble, client scramble) ed25519-signed by a secret key generated from the PBKDF2(password, ext-salt)

            5. Server replies with "ok" or "acces denied"
            {panel}

            {panel:title=first idea}
            h1. Rough idea

            * the KDF function is pbkdf2 (supported by everything, including [windows native|https://learn.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptderivekeypbkdf2], Java, javascript, PHP, .NET
            * parameters to the pbkdf2 are stored in with authentication plugin data : hash function (SHA512,SHA256), interation count, salt, key_length, together with derived key = PBKDF2(func, password, oalt, iteration_count, key_length)

            h2. Login process, packet exchange

            1. Server sends ServerPluginParameters message with hash function, interation count, salt, key_length.
                This is the only unencrypted message during entire exchange
               
            2 . Client computes derived key from password and parameters:
                 derived_key= PBKDF2(hash_func, password, salt, iteration_count, key_length)
                 Client sends ServerVerificationChallenge = AES_ENCRYPT(client_scramble,derived_key) to server

            3. server decrypts ServerVerificationChallenge and sends
                 
                 ServerVerificationResponse = AES_ENCRYPT(concat(server_scramble,client_scramble)), derived_key))

            4. client verifies AES_DECRYPT(ServerVerificationResponse, derived_key) =concat(server_scramble,client_scramble).
                 If they don't match, client could not verify the server, and error is reported.

                Client still has to prove it has the password, not just the derived key
                 So it sends
                 ClientEncryptedPassword message = AES_ENCRYPT(concat(hash_func(password),server_scramble,client_scramble)),derived_key)

            5. Server verifies the client
                a) tmp = AES_DECRYPT(ClientEncryptedPassword. derived_key)
                b) hashed_password=substr(tmp, hash_length)
                c) derived_key2 = PBKDF2(hash_func, hashed_password, salt, iteration_count, key_length)
                and compares derived_key and derived_key2 for equality, (due to the [HMAC_collisions property of pbkdf2| https://en.wikipedia.org/wiki/PBKDF2#HMAC_collisions], password and hash_func(password) would produce the same keys)
               Server sends OK or ERR packet
            {panel}
            serg Sergei Golubchik made changes -
            Assignee Nikita Malyavin [ nikitamalyavin ] Sergei Golubchik [ serg ]
            serg Sergei Golubchik made changes -
            Status In Progress [ 3 ] Stalled [ 10000 ]
            serg Sergei Golubchik made changes -
            Status Stalled [ 10000 ] In Testing [ 10301 ]
            serg Sergei Golubchik made changes -
            Assignee Sergei Golubchik [ serg ] Ramesh Sivaraman [ JIRAUSER48189 ]
            serg Sergei Golubchik made changes -
            ramesh Ramesh Sivaraman made changes -
            ralf.gebhardt Ralf Gebhardt made changes -
            Labels Preview_11.6
            serg Sergei Golubchik made changes -
            serg Sergei Golubchik made changes -

            ok to push

            ramesh Ramesh Sivaraman added a comment - ok to push
            ramesh Ramesh Sivaraman made changes -
            Assignee Ramesh Sivaraman [ JIRAUSER48189 ] Nikita Malyavin [ nikitamalyavin ]
            Status In Testing [ 10301 ] Stalled [ 10000 ]
            ralf.gebhardt Ralf Gebhardt made changes -
            Summary new auth plugin PARSEC Authentication Plugin
            ralf.gebhardt Ralf Gebhardt made changes -
            georg Georg Richter added a comment -

            Any reason to use ed25519? Windows bcrypt doesn't support ed22519, so it can't be used under windows.

            georg Georg Richter added a comment - Any reason to use ed25519? Windows bcrypt doesn't support ed22519, so it can't be used under windows.

            georg bcrypt supports it, but poorly. Wee need to generate public key from private key in order to make our protocol work.

            Do you have some other algorithm in mind?

            nikitamalyavin Nikita Malyavin added a comment - georg bcrypt supports it, but poorly. Wee need to generate public key from private key in order to make our protocol work. Do you have some other algorithm in mind?

            georg, also, if there will be no other solution (like ed22519 in bcrypt or some other algorithm) we can resort to linking with plugins/auth/ref10, it's already a part of the source anyway. I'd prefer not to, but it's an option.

            serg Sergei Golubchik added a comment - georg , also, if there will be no other solution (like ed22519 in bcrypt or some other algorithm) we can resort to linking with plugins/auth/ref10 , it's already a part of the source anyway. I'd prefer not to, but it's an option.

            Just to clarify, ed25519 is available on windows through openssl

            nikitamalyavin Nikita Malyavin added a comment - Just to clarify, ed25519 is available on windows through openssl
            georg Georg Richter added a comment -

            nikitamalyavin Right, but by default we build Connector/C under windows with SChannel/Bcrypt
            to avoid possible license problems and to minimize external dependencies.

            wlad Any insights about bcrypt and ed25519 support ?

            georg Georg Richter added a comment - nikitamalyavin Right, but by default we build Connector/C under windows with SChannel/Bcrypt to avoid possible license problems and to minimize external dependencies. wlad Any insights about bcrypt and ed25519 support ?

            No idea, @Georg.But if someone came with brilliant idea of using some particular algorithms, he thought about it being available on every platform, beforehand, right? Also in languages other than C, because if we want that to be default, it should be kinda mainstream?

            wlad Vladislav Vaintroub added a comment - No idea, @Georg.But if someone came with brilliant idea of using some particular algorithms, he thought about it being available on every platform, beforehand, right? Also in languages other than C, because if we want that to be default, it should be kinda mainstream?

            Having said that, there is some code I shared with nikita, some time ago https://github.com/WireGuard/wireguard-nt/blob/cbf27645083b25caf9dd0c4d6b07163a10c3841d/example/example.c#L147 . this generates public-private key pair with ed25519, although uses some undocumented structure.

            there is something similar in https://stackoverflow.com/questions/76925303/generating-curve25519-curve-key-pair-with-bcrypt-in-windows/77062918#77062918

            I do not know nikita's specific needs, not an expert in what he did

            wlad Vladislav Vaintroub added a comment - Having said that, there is some code I shared with nikita, some time ago https://github.com/WireGuard/wireguard-nt/blob/cbf27645083b25caf9dd0c4d6b07163a10c3841d/example/example.c#L147 . this generates public-private key pair with ed25519, although uses some undocumented structure. there is something similar in https://stackoverflow.com/questions/76925303/generating-curve25519-curve-key-pair-with-bcrypt-in-windows/77062918#77062918 I do not know nikita's specific needs, not an expert in what he did
            georg Georg Richter added a comment -

            nikitamalyavin No, I don't have another algorithm in mind. And that should have been discussed before starting implementation (by adding issues for C/C and non C-based Connectors).

            georg Georg Richter added a comment - nikitamalyavin No, I don't have another algorithm in mind. And that should have been discussed before starting implementation (by adding issues for C/C and non C-based Connectors).

            No worries, georg. We have a compatible ed25519 implementation bundled in the ed25519 auth plugin, sowe had a plan for the case if some mainstream config couldn't cover it. We just intended to use what system has. And we decided that it can be released without bcrypt support in its initial version.

            nikitamalyavin Nikita Malyavin added a comment - No worries, georg . We have a compatible ed25519 implementation bundled in the ed25519 auth plugin, sowe had a plan for the case if some mainstream config couldn't cover it. We just intended to use what system has. And we decided that it can be released without bcrypt support in its initial version.
            nikitamalyavin Nikita Malyavin added a comment - - edited

            ralf.gebhardt I'd thought to reply that let's see it in main branch first, but since its client part is already released in C/C 3.4 – yes, I think we can close it

            nikitamalyavin Nikita Malyavin added a comment - - edited ralf.gebhardt I'd thought to reply that let's see it in main branch first, but since its client part is already released in C/C 3.4 – yes, I think we can close it
            georg Georg Richter added a comment -

            Please don't close it. We will not release C/C 3.4 GA before there is a working solution for windows. And please also file a corresponding task for CONC and other Connectors which don't use Connector/C.

            georg Georg Richter added a comment - Please don't close it. We will not release C/C 3.4 GA before there is a working solution for windows. And please also file a corresponding task for CONC and other Connectors which don't use Connector/C.
            serg Sergei Golubchik made changes -
            serg Sergei Golubchik made changes -
            serg Sergei Golubchik made changes -

            C/C 3.4 is already released with PARSEC support.

            nikitamalyavin Nikita Malyavin added a comment - C/C 3.4 is already released with PARSEC support.
            nikitamalyavin Nikita Malyavin made changes -
            Fix Version/s 11.6.1 [ 29847 ]
            Fix Version/s 11.6 [ 29515 ]
            Resolution Fixed [ 1 ]
            Status Stalled [ 10000 ] Closed [ 6 ]
            diego dupin Diego Dupin made changes -
            diego dupin Diego Dupin made changes -
            serg Sergei Golubchik made changes -
            serg Sergei Golubchik made changes -
            marko Marko Mäkelä made changes -
            ralf.gebhardt Ralf Gebhardt made changes -
            cvicentiu Vicențiu Ciorbaru made changes -
            nikitamalyavin Nikita Malyavin made changes -
            nikitamalyavin Nikita Malyavin made changes -

            Should parsec work ootb in server 11.6.2 ?
            I had do lower plugin_maturity to beta to be able to load the plugin.

            swiffer Matthias Wirtz added a comment - Should parsec work ootb in server 11.6.2 ? I had do lower plugin_maturity to beta to be able to load the plugin.

            Hello, swiffer!

            Yes, it is supposed to just work, but I think 11.6.2 still needed openssl on windows.

            What's your setup, and what are the steps to reproduce?

            nikitamalyavin Nikita Malyavin added a comment - Hello, swiffer ! Yes, it is supposed to just work, but I think 11.6.2 still needed openssl on windows. What's your setup, and what are the steps to reproduce?

            I'm running MariaDB 11.6.2 on Ubuntu 24.04. Within /etc/mysql/mariadb.conf.d/50-server.cnf I enabled the parsec plugin as described in the mariadb docs via plugin_load_add = auth_parsec.

            MariaDB emmits these ERRORs on startup:

            Nov 21 19:34:03 XXX mariadbd[46425]: 2024-11-21 19:34:03 0 [ERROR] mariadbd: Can't open shared library 'auth_parsec.so' (errno: 1, Loading of beta plugin parsec is prohibited by >
            Nov 21 19:34:03 XXX mariadbd[46425]: 2024-11-21 19:34:03 0 [ERROR] Couldn't load plugins from 'auth_parsec.so'.

            Adding plugin_maturity = beta to the conf solved the issue for now. I guess the Plugin maturity hasn't been bumped when going from 11.6.1 to 11.6.2.

            swiffer Matthias Wirtz added a comment - I'm running MariaDB 11.6.2 on Ubuntu 24.04. Within /etc/mysql/mariadb.conf.d/50-server.cnf I enabled the parsec plugin as described in the mariadb docs via plugin_load_add = auth_parsec. MariaDB emmits these ERRORs on startup: Nov 21 19:34:03 XXX mariadbd [46425] : 2024-11-21 19:34:03 0 [ERROR] mariadbd: Can't open shared library 'auth_parsec.so' (errno: 1, Loading of beta plugin parsec is prohibited by > Nov 21 19:34:03 XXX mariadbd [46425] : 2024-11-21 19:34:03 0 [ERROR] Couldn't load plugins from 'auth_parsec.so'. Adding plugin_maturity = beta to the conf solved the issue for now. I guess the Plugin maturity hasn't been bumped when going from 11.6.1 to 11.6.2.
            nikitamalyavin Nikita Malyavin made changes -

            thanks, created MDEV-35482

            nikitamalyavin Nikita Malyavin added a comment - thanks, created MDEV-35482

            People

              nikitamalyavin Nikita Malyavin
              serg Sergei Golubchik
              Votes:
              0 Vote for this issue
              Watchers:
              11 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved:

                Git Integration

                  Error rendering 'com.xiplink.jira.git.jira_git_plugin:git-issue-webpanel'. Please contact your Jira administrators.