[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#927306: Alternative apporach for password re-setup



Hi Nik,

On  Do 18 Apr 2019 21:49:58 CEST, Dominik George wrote:

with the attached patch, the conversion works on buster.

The script uses php-mcrypt for no reason - the first use always returns
an constant 16, the second returns random bytes.

With the applied patch, the script works without php-mcrypt.

While focusing on what the two mcrypt library calls did, something felt
weird, but I didn't know what. I somehow did not trust that what I did
was right, because how this decryption should work was not entirely
clear to me, despite having basic understanding of how it works.

Now I know why: A random IV does not make any sense at all in
decryption, and in ECB mode, there is no such thing as an IV at all.

Thus, I updated the patch to remove that useless code all together.

-nik

This is a well tested patch that I can upload tonight (to unstable)? Or is more testing time needed? If the patch really fixes the transition, then we don't need the gosa s-pu. Do all agree?

Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4354) 8390 139

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabriel@das-netzwerkteam.de, http://das-netzwerkteam.de

Attachment: pgpoZ6BF3gbv7.pgp
Description: Digitale PGP-Signatur


Reply to: