[Mono-bugs] [Bug 79499][Wis] Changed - PasswordDeriveByte may derive *extra* data differently on ms.net and mono

bugzilla-daemon at bugzilla.ximian.com bugzilla-daemon at bugzilla.ximian.com
Fri Oct 13 12:37:13 EDT 2006


Please do not reply to this email- if you want to comment on the bug, go to the
URL shown below and enter your comments there.

Changed by sebastien at ximian.com.

http://bugzilla.ximian.com/show_bug.cgi?id=79499

--- shadow/79499	2006-09-26 14:32:35.000000000 -0400
+++ shadow/79499.tmp.29362	2006-10-13 12:37:13.000000000 -0400
@@ -1,15 +1,15 @@
 Bug#: 79499
 Product: Mono: Class Libraries
 Version: 1.1
 OS: other
 OS Details: Gentoo 32bit
-Status: NEW   
-Resolution: 
+Status: RESOLVED   
+Resolution: WONTFIX
 Severity: Unknown
-Priority: Minor
+Priority: Wishlist
 Component: CORLIB
 AssignedTo: sebastien at ximian.com                            
 ReportedBy: carlos at applianz.com               
 QAContact: mono-bugs at ximian.com
 TargetMilestone: ---
 URL: 
@@ -132,6 +132,15 @@
 Of course doing this doesn't solve any of the issues I mentionned ;-)
 
 A safer variation would be to change the default SHA1 hash algorithm
 (HashName property) to SHA384 or SHA512. This will produce 48 to 64
 "quality" derived bytes (solving one of the issues you currently have
 in your sample).
+
+------- Additional Comments From sebastien at ximian.com  2006-10-13 12:37 -------
+I had a look and it won't be easy as this is totally undocumented
+(i.e. means a LOT of hours for something that will remain problematic
+forever). IMO key derivation is too important to depend on something
+undocumented.
+
+I updated monodoc to warn about interoperability problems.
+Closing as WONTFIX.


More information about the mono-bugs mailing list