[Mono-bugs] [Bug 79499][Wis] Changed - PasswordDeriveByte may derive *extra* data differently on ms.net and mono
bugzilla-daemon at bugzilla.ximian.com
bugzilla-daemon at bugzilla.ximian.com
Fri Oct 13 12:37:13 EDT 2006
Please do not reply to this email- if you want to comment on the bug, go to the
URL shown below and enter your comments there.
Changed by sebastien at ximian.com.
http://bugzilla.ximian.com/show_bug.cgi?id=79499
--- shadow/79499 2006-09-26 14:32:35.000000000 -0400
+++ shadow/79499.tmp.29362 2006-10-13 12:37:13.000000000 -0400
@@ -1,15 +1,15 @@
Bug#: 79499
Product: Mono: Class Libraries
Version: 1.1
OS: other
OS Details: Gentoo 32bit
-Status: NEW
-Resolution:
+Status: RESOLVED
+Resolution: WONTFIX
Severity: Unknown
-Priority: Minor
+Priority: Wishlist
Component: CORLIB
AssignedTo: sebastien at ximian.com
ReportedBy: carlos at applianz.com
QAContact: mono-bugs at ximian.com
TargetMilestone: ---
URL:
@@ -132,6 +132,15 @@
Of course doing this doesn't solve any of the issues I mentionned ;-)
A safer variation would be to change the default SHA1 hash algorithm
(HashName property) to SHA384 or SHA512. This will produce 48 to 64
"quality" derived bytes (solving one of the issues you currently have
in your sample).
+
+------- Additional Comments From sebastien at ximian.com 2006-10-13 12:37 -------
+I had a look and it won't be easy as this is totally undocumented
+(i.e. means a LOT of hours for something that will remain problematic
+forever). IMO key derivation is too important to depend on something
+undocumented.
+
+I updated monodoc to warn about interoperability problems.
+Closing as WONTFIX.
More information about the mono-bugs
mailing list