• Icon: Suggestion Suggestion
    • Resolution: Fixed
    • 2.5
    • None
    • None
    • Our product teams collect and evaluate feedback from a number of different sources. To learn more about how we use customer feedback in the planning process, check out our new feature policy.

      bcrypt provides an algorithm that requires extensive, tunable work to test a password, making it resistant to brute-force password cracking. Crowd should include it.

            [CWD-2810] Support bcrypt password encoding

            Katherine Yabut made changes -
            Workflow Original: JAC Suggestion Workflow [ 3388186 ] New: JAC Suggestion Workflow 3 [ 3626735 ]
            Status Original: RESOLVED [ 5 ] New: Closed [ 6 ]
            Monique Khairuliana (Inactive) made changes -
            Workflow Original: Simplified Crowd Development Workflow v2 [ 1389941 ] New: JAC Suggestion Workflow [ 3388186 ]
            Issue Type Original: Improvement [ 4 ] New: Suggestion [ 10000 ]
            Owen made changes -
            Workflow Original: Crowd Development Workflow v2 [ 379326 ] New: Simplified Crowd Development Workflow v2 [ 1389941 ]

            I know you've already gotten an answer to this question on another issue, but for the benefit of those who come after, yes, you are correct, and you can read CWD-3812 if you're interested what "compatibility" means.

            Caspar Krieger (Inactive) added a comment - I know you've already gotten an answer to this question on another issue, but for the benefit of those who come after, yes, you are correct, and you can read CWD-3812 if you're interested what "compatibility" means.

            prdonahue added a comment -

            Great, thanks. So if I set up Crowd and have passwords created/stored there I should have no problem pointing the following to it?

            JIRA
            Confluence
            CrowdID
            Gerrit (via CrowdID)

            At least as far as password hashes go?

            prdonahue added a comment - Great, thanks. So if I set up Crowd and have passwords created/stored there I should have no problem pointing the following to it? JIRA Confluence CrowdID Gerrit (via CrowdID) At least as far as password hashes go?

            joe added a comment -

            Which incompatibilities exist, specifically?

            If you want to move a user database between products, including encrypted passwords, then only ATLASSIAN-SECURITY is supported across all products. If you're using Crowd as a directory server and you're creating and storing passwords only on the Crowd server then bcrypt is an appropriate choice. The current wording is misleading: I've opened CWD-3812 to improve the in-product documentation.

            joe added a comment - Which incompatibilities exist, specifically? If you want to move a user database between products, including encrypted passwords, then only ATLASSIAN-SECURITY is supported across all products. If you're using Crowd as a directory server and you're creating and storing passwords only on the Crowd server then bcrypt is an appropriate choice. The current wording is misleading: I've opened CWD-3812 to improve the in-product documentation.

            prdonahue added a comment -

            The install still reads "For compatibility between Atlassian products you must use ATLASSIAN-SECURITY."

            Which incompatibilities exist, specifically? We would much prefer to use bcrypt but without more detail don't know if we are setting ourselves up for some sort of major fail.

            prdonahue added a comment - The install still reads "For compatibility between Atlassian products you must use ATLASSIAN-SECURITY." Which incompatibilities exist, specifically ? We would much prefer to use bcrypt but without more detail don't know if we are setting ourselves up for some sort of major fail.

            Great, thanks.

            Jeff Turner added a comment - Great, thanks.

            joe added a comment -

            Hi Jeff.

            Our current default (PKCS #5 v2.0) already uses a random salt and a high iteration count, so it's already a secure algorithm. We won't be switching the default: bcrypt is for those who have a strong preference or require interoperability.

            joe added a comment - Hi Jeff. Our current default (PKCS #5 v2.0) already uses a random salt and a high iteration count, so it's already a secure algorithm. We won't be switching the default: bcrypt is for those who have a strong preference or require interoperability.

            Thanks Joseph for implementing this. I was just reading why bcrypt is better than sha1. Is bcrypt going to be the default?

            Jeff Turner added a comment - Thanks Joseph for implementing this. I was just reading why bcrypt is better than sha1 . Is bcrypt going to be the default?

              jwalton joe
              jwalton joe
              Votes:
              0 Vote for this issue
              Watchers:
              4 Start watching this issue

                Created:
                Updated:
                Resolved: