-
Notifications
You must be signed in to change notification settings - Fork 30
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
MyProxy: change private key cipher to EVP_aes_256_cbc() #230
MyProxy: change private key cipher to EVP_aes_256_cbc() #230
Conversation
@msalle : |
Hi @fscheiner Thanks! |
Good idea! I also shortly thought about something like that, e.g. when in ten years or so AES256 is considered old and deprecated. ;-) Would you place it in the header or directly into myproxy/source/ssl_utils.c? Maybe the latter is better, because one does not have to check which include includes it if need be. |
currently still not yet broken and they claim it's quantum crypto safe... (famous last words?)
one of the reasons I hadn't made the patch was that I hadn't come up with a decision for that. I'm thinking it might be nice in the header, since it's then part of the public API, but easier in ssl_utils.c. Probably better for now in the ssl_utils.c for reason you're giving. And we can always make it public later when needed. |
:-))
I can make the changes. I think we don't need another build test as it worked for the current version already, but just a positive review for merging it. Apart from that we can still have a discussion about that change of course. CCing @ellert @maarten-litmaath. Not sure, is Jim still interested in or working on MyProxy? If yes, then we should maybe CC him, too. |
2d2f501
to
bd8a6e0
Compare
Hi guys, I suspect Jim would not really want to spend time on MyProxy any more... |
Hi Maarten,
According to #229:
...I'd say yes. |
So the improvement will by default only benefit new installations? |
Most likely, but I don't know if MyProxy only stores a private key locally during initial setup. But even if not, the functions for reading it won't care if a new key is AES256 encrypted. |
Just to clarify: for each proxy that gets delegated to myproxy it creates and stores a new private key. But changing the format even for an existing server looks fine because it can read the different ciphers. So having a mixed set in its data store in /var/lib/myproxy/ seems totally fine. As such an update would be totally transparent for any client. |
Thanks for the clarification. Looking good, so I'd say let's do it. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Other than the extra () in the #ifndef (see cmment there) I think it looks be fine. Also probably good to see whether the tests succeed.
As per gridcf#229 MyProxy still used an old cipher for encrypting private keys. Changes courtesy of Mischa Salle (@msalle). Fixes gridcf#229.
bd8a6e0
to
456e057
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Assuming the builds and tests go well, I'd say looks good to me.
Checks look good. Merging this now. |
As per #229 MyProxy still used an old cipher for encrypting private keys. Changes courtesy of Mischa Salle (@msalle).
Fixes #229.