[wildfly-dev] On the WildFly Elytron PasswordFactory API

David M. Lloyd david.lloyd at redhat.com
Thu Jun 12 12:08:31 EDT 2014


On 06/12/2014 10:55 AM, Anil Saldhana wrote:
> I also want to highlight the difference between PBE and PBKDF2
> (http://en.wikipedia.org/wiki/PBKDF2).
> Developers keep pushing for PBKDF2 which is essentially a one way
> process. You cannot get the password back.
> In the case of an application server, there is a need to get access to
> the configured database password to talk to
> a database or another EIS system. So it is a two way process.  Not all
> databases can do a hashed/digest mechanism.
>
> I hope we can document this in Elytron documentation somewhere.

The Password SPI in fact has OneWayPassword and TwoWayPassword 
sub-interfaces.

At present, the only TwoWayPassword implementation we have is "clear", 
which, as the name says, is a clear password (and thus is trivially 
"reversible").  We recently were discussing that there seem to be very 
few (if any) good, reliable two-way password strategies (which do not 
involve a keystore, which is *not* the same thing).

I've deliberately been referring to non-clear TwoWayPassword schemes as 
"obfuscation" rather than "encryption" since few (if any) two-way 
algorithms will actually make the password "secure" in the event of 
theft.  More likely this is for the "accidental printout" kind of case.

That said, if anyone knows of any good two-way password obfuscation 
algorithms they think should be supported, please comment here and/or 
open an issue at https://issues.jboss.org/browse/ELY describing the 
algorithm (preferably with a link to a specification if possible).

-- 
- DML


More information about the wildfly-dev mailing list