[Users] [Bug 4405] New: SCRAM-SHA-512(-PLUS)/SCRAM-SHA3-512(-PLUS) supports
noreply at thewildbeast.co.uk
noreply at thewildbeast.co.uk
Sun Nov 1 02:09:51 CET 2020
https://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=4405
Bug ID: 4405
Summary: SCRAM-SHA-512(-PLUS)/SCRAM-SHA3-512(-PLUS) supports
Product: Claws Mail
Version: GIT
Hardware: All
OS: All
Status: NEW
Severity: blocker
Priority: P3
Component: Other
Assignee: users at lists.claws-mail.org
Reporter: Neustradamus at hotmail.com
CRAM-MD5 to Historic:
- https://tools.ietf.org/html/draft-ietf-sasl-crammd5-to-historic-00 // 20
November 2008
- https://tools.ietf.org/html/draft-zeilenga-luis140219-crammd5-to-historic-00
// June 29, 2017
RFC6331: Moving DIGEST-MD5 to Historic:
- https://tools.ietf.org/html/rfc6331 since July 2011
RFC 8600:
"When using the SASL SCRAM mechanism, the SCRAM-SHA-256-PLUS variant SHOULD be
preferred over the SCRAM-SHA-256 variant, and SHA-256 variants [RFC7677] SHOULD
be preferred over SHA-1 variants [RFC5802]".
SCRAM-SHA-1(-PLUS): There is one ticket:
https://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=2796
- RFC5802: Salted Challenge Response Authentication Mechanism (SCRAM) SASL and
GSS-API Mechanisms: https://tools.ietf.org/html/rfc5802
- RFC6120: Extensible Messaging and Presence Protocol (XMPP): Core:
https://tools.ietf.org/html/rfc6120
SCRAM-SHA-256(-PLUS): There is one ticket:
https://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=4289
- RFC7677: SCRAM-SHA-256 and SCRAM-SHA-256-PLUS Simple Authentication and
Security Layer (SASL) Mechanisms: https://tools.ietf.org/html/rfc7677 - since
2015-11-02
- RFC8600: Using Extensible Messaging and Presence Protocol (XMPP) for Security
Information Exchange: https://tools.ietf.org/html/rfc8600 - since 2019-06-21:
https://mailarchive.ietf.org/arch/msg/ietf-announce/suJMmeMhuAOmGn_PJYgX5Vm8lNA
SCRAM-SHA-512(-PLUS):
- https://tools.ietf.org/html/draft-melnikov-scram-sha-512
SCRAM-SHA3-512(-PLUS):
- https://tools.ietf.org/html/draft-melnikov-scram-sha3-512
-PLUS variants:
- RFC5056: On the Use of Channel Bindings to Secure Channels:
https://tools.ietf.org/html/rfc5056
- RFC5929: Channel Bindings for TLS: https://tools.ietf.org/html/rfc5929
- Channel-Binding Types:
https://www.iana.org/assignments/channel-binding-types/channel-binding-types.xhtml
- Channel Bindings for SCRAM over TLS 1.3:
https://tools.ietf.org/html/draft-whited-tls-channel-bindings-for-tls13 ->
https://tools.ietf.org/html/draft-ietf-kitten-tls-channel-bindings-for-tls13
LDAP:
- RFC5803: Lightweight Directory Access Protocol (LDAP) Schema for Storing
Salted: Challenge Response Authentication Mechanism (SCRAM) Secrets:
https://tools.ietf.org/html/rfc5803
HTTP:
- RFC7804: Salted Challenge Response HTTP Authentication Mechanism:
https://tools.ietf.org/html/rfc7804
2FA:
- Extensions to Salted Challenge Response (SCRAM) for 2 factor authentication:
https://tools.ietf.org/html/draft-melnikov-scram-2fa
IANA:
- Simple Authentication and Security Layer (SASL) Mechanisms:
https://www.iana.org/assignments/sasl-mechanisms/sasl-mechanisms.xhtml
Note, after SCRAM-SHA-1(-PLUS):
- GNU SASL (gsasl) supports SCRAM-SHA-256(-PLUS) since 1.9.1:
http://git.savannah.gnu.org/gitweb/?p=gsasl.git;a=blob;f=NEWS;hb=HEAD
- Dovecot supports SCRAM-SHA-256(-PLUS) since 2.3.10:
https://doc.dovecot.org/configuration_manual/authentication/authentication_mechanisms/
- Cyrus SASL/IMAP supports SCRAM-SHA-256(-PLUS) and more since 2.1.27:
https://www.cyrusimap.org/sasl/sasl/authentication_mechanisms.html
- ...
Linked to:
- https://github.com/scram-xmpp/info/issues/1
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the Users
mailing list