Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SCRAM-SHA-1-PLUS + SCRAM-SHA-224-PLUS + SCRAM-SHA-256-PLUS + SCRAM-SHA-384-PLUS + SCRAM-SHA-512-PLUS + SCRAM-SHA3-512(-PLUS) supports #1

Open
Neustradamus opened this issue Nov 8, 2020 · 7 comments

Comments

@Neustradamus
Copy link

Neustradamus commented Nov 8, 2020

After (which it is already good for Roundcube : @alecpl)

  • SCRAM-SHA-1
  • SCRAM-SHA-224
  • SCRAM-SHA-256
  • SCRAM-SHA-384
  • SCRAM-SHA-512

It is possible to add other SCRAM?

  • SCRAM-SHA3-512

TLS Binding:

  • SCRAM-SHA-1-PLUS
  • SCRAM-SHA-224-PLUS
  • SCRAM-SHA-256-PLUS
  • SCRAM-SHA-384-PLUS
  • SCRAM-SHA-512-PLUS
  • SCRAM-SHA3-512-PLUS

Thanks in advance


"When using the SASL SCRAM mechanism, the SCRAM-SHA-256-PLUS variant SHOULD be preferred over the SCRAM-SHA-256 variant, and SHA-256 variants [RFC7677] SHOULD be preferred over SHA-1 variants [RFC5802]".

https://xmpp.org/extensions/inbox/hash-recommendations.html

-PLUS variants:

IMAP:

LDAP:

  • RFC5803: Lightweight Directory Access Protocol (LDAP) Schema for Storing Salted: Challenge Response Authentication Mechanism (SCRAM) Secrets: https://tools.ietf.org/html/rfc5803

HTTP:

2FA:

IANA:

Linked to:

@Neustradamus
Copy link
Author

@derickr, @OpenPrunus, @mbretter, @anishmystery, @akhileshpv, @gwynne, @till, @ashnazg, @kenguest, @cweiske, @mj, @net-tools, @edhelas, @Jehan, @CloCkWeRX: Please read the text in the main ticket.

Thanks in advance.

@Jehan
Copy link

Jehan commented Nov 8, 2020

Hi @Neustradamus !

When I originally implemented SCRAM in Auth_SASL, I had an actual usage of this (for a XMPP-related code I was developing and using). I don't anymore, so I don't think I will be able to make any time to read again the spec, then the new specs, then to implement further.

Yet this is obviously a good idea to follow evolution in standards and to implement whatever is new. That's Free Software, anyone is free to take it from here and to improve my code (or make a new one, if needed). 🙂

I hope someone will implement this. It just probably won't be me.

@till
Copy link

till commented Nov 8, 2020

Hey @Neustradamus — I think generally everyone is open to pull-requests, but no need to ping people. Do you want to give a PR a try? Just make sure to add tests covering it. :) Or covering changes before you make them.

@Neustradamus
Copy link
Author

@Jehan: Thanks for your reply and I know, thanks a lot for your contributions :)

@till: Thanks for your reply.
Several years ago, I have sent an email about this request, no reply.

And there are problems on GitHub:

1/ https://github.com/pear/Auth_SASL2 is a fork of CloCkWeRX/Auth_SASL2 and CloCkWeRX/Auth_SASL2 is not up-to-date, maybe we can do a transfer?

2/ A lot of pear repositories have not the "Issues" section enabled, can you open sections to all repositories?

At beginning, can you add here:

Several issues are linked to:

Thanks in advance.

@kenguest
Copy link
Contributor

kenguest commented Nov 9, 2020

hi @Neustradamus - a PR or two would go a long way :-) I don't have much spare time these days to spend on adding code to a package that I'm not really using myself, but I don't mind looking over the occasional PR.

:-)

@Neustradamus
Copy link
Author

@ all,

In first, I wish you a Happy New Year 2022!

I have added the last IMAP RFC which has SCRAM-SHA-256 and SCRAM-SHA-256-PLUS supports.

Auth_SASL/Auth_SASL2 support already SCRAM-SHA-1/SCRAM-SHA-224/SCRAM-SHA-256/SCRAM-SHA-384/SCRAM-SHA-512.
It is good for Roundcube.

One guy can add in:

Thanks in advance.

@Neustradamus
Copy link
Author

@ all: It is official for TLS 1.3 Binding!

Details:

  • tls-unique for TLS =< 1.2
  • tls-exporter for TLS = 1.3

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants