diff options
author | Kim Alvefur <zash@zash.se> | 2020-05-22 20:59:01 +0200 |
---|---|---|
committer | Kim Alvefur <zash@zash.se> | 2020-05-22 20:59:01 +0200 |
commit | f6bef24491d34b93c1e0b1279633254447962d39 (patch) | |
tree | 5c4bde468165af24c102ec6ba1f786bccd3fddce | |
parent | f5d112f8329b0fa8968132911c681406b1e26933 (diff) | |
download | prosody-f6bef24491d34b93c1e0b1279633254447962d39.tar.gz prosody-f6bef24491d34b93c1e0b1279633254447962d39.zip |
util.sasl.scram: Apply saslprep before hashing password, fixes #1560
-rw-r--r-- | util/sasl/scram.lua | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/util/sasl/scram.lua b/util/sasl/scram.lua index 043f328b..f64feb8b 100644 --- a/util/sasl/scram.lua +++ b/util/sasl/scram.lua @@ -106,6 +106,10 @@ local function getAuthenticationDatabaseSHA1(password, salt, iteration_count) if iteration_count < 4096 then log("warn", "Iteration count < 4096 which is the suggested minimum according to RFC 5802.") end + password = saslprep(password); + if not password then + return false, "password fails SASLprep"; + end local salted_password = Hi(password, salt, iteration_count); local stored_key = sha1(hmac_sha1(salted_password, "Client Key")) local server_key = hmac_sha1(salted_password, "Server Key"); |