diff options
author | Kim Alvefur <zash@zash.se> | 2020-05-22 20:59:01 +0200 |
---|---|---|
committer | Kim Alvefur <zash@zash.se> | 2020-05-22 20:59:01 +0200 |
commit | f72fa3b2abd2bf18540460b37bf9ca1c8a479b7f (patch) | |
tree | 5c4bde468165af24c102ec6ba1f786bccd3fddce | |
parent | 984bf1c1bfc83537db694e0a340e5f44772ee6ba (diff) | |
download | prosody-f72fa3b2abd2bf18540460b37bf9ca1c8a479b7f.tar.gz prosody-f72fa3b2abd2bf18540460b37bf9ca1c8a479b7f.zip |
util.sasl.scram: Apply saslprep before hashing password, fixes #1560
-rw-r--r-- | util/sasl/scram.lua | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/util/sasl/scram.lua b/util/sasl/scram.lua index 043f328b..f64feb8b 100644 --- a/util/sasl/scram.lua +++ b/util/sasl/scram.lua @@ -106,6 +106,10 @@ local function getAuthenticationDatabaseSHA1(password, salt, iteration_count) if iteration_count < 4096 then log("warn", "Iteration count < 4096 which is the suggested minimum according to RFC 5802.") end + password = saslprep(password); + if not password then + return false, "password fails SASLprep"; + end local salted_password = Hi(password, salt, iteration_count); local stored_key = sha1(hmac_sha1(salted_password, "Client Key")) local server_key = hmac_sha1(salted_password, "Server Key"); |