Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SCRAM-SHA-256(-PLUS) supports #15

Open
Neustradamus opened this issue Sep 22, 2020 · 6 comments
Open

SCRAM-SHA-256(-PLUS) supports #15

Neustradamus opened this issue Sep 22, 2020 · 6 comments

Comments

@Neustradamus
Copy link

Neustradamus commented Sep 22, 2020

"When using the SASL SCRAM mechanism, the SCRAM-SHA-256-PLUS variant SHOULD be preferred over the SCRAM-SHA-256 variant, and SHA-256 variants [RFC7677] SHOULD be preferred over SHA-1 variants [RFC5802]".

After SCRAM-SHA-1(-PLUS):

There is SCRAM-SHA-256(-PLUS):

SCRAM-SHA-512(-PLUS):

SCRAM-SHA3-512(-PLUS):

https://xmpp.org/extensions/inbox/hash-recommendations.html

-PLUS variants:

LDAP:

  • RFC5803: Lightweight Directory Access Protocol (LDAP) Schema for Storing Salted: Challenge Response Authentication Mechanism (SCRAM) Secrets: https://tools.ietf.org/html/rfc5803

HTTP:

2FA:

IANA:

Linked to:

@github-actions
Copy link

Welcome, thank you for supporting Ubiety.Xmpp.Core by helping make it better.

@coder2000
Copy link
Member

Implemented in upcoming release supporting .NET 5.

@Neustradamus
Copy link
Author

Neustradamus commented Nov 12, 2020

@coder2000: Thanks for your reply!

I have added a new ticket for:

  • SCRAM-SHA-512(-PLUS)
  • SCRAM-SHA3-512(-PLUS)

Here: #16

@Neustradamus
Copy link
Author

Hello @coder2000, the .NET 5 has been released, have you progressed on it?

@coder2000
Copy link
Member

I haven't made an official nuget release but development or the binding feature branch are setup to use .NET 9. Let me know if you have any further questions. Apologies for the delay in response.

@Neustradamus
Copy link
Author

@coder2000: Thanks for your message, it is never too late :)
Good to see that the development is always here!

What have you already added?

What SCRAM supports and Channel Binding for TLS 1.2 and TLS 1.3?

  • tls-unique for TLS =< 1.2
  • tls-server-end-point =< 1.2 + 1.3
  • tls-exporter for TLS = 1.3

Thanks in advance.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants