2020-03-04 16:29:34 |
Damien Ciabrini |
description |
By default, connection to the mysql server implements an authentication protocol [1] that relies on SHA1 internally between the client and the server.
Since mariadb 10.1.21, a new authentication plugin is available in MariaDB that allows a client to authenticate to the server by using a more secure authentication scheme that uses ed25519 cryptographic primitives.
This launchpad bug tracks the necessary updates to implement in OpenStack to use ed25519 authentication on tripleo-deployed stacks. |
By default, connection to the mysql server implements an authentication protocol [1] that relies on SHA1 internally between the client and the server.
Since mariadb 10.1.21, a new authentication plugin is available in MariaDB that allows a client to authenticate to the server by using a more secure authentication scheme that uses ed25519 cryptographic primitives.
This launchpad bug tracks the necessary updates to implement in OpenStack to use ed25519 authentication on tripleo-deployed stacks.
[1] https://dev.mysql.com/doc/dev/mysql-server/latest/page_protocol_connection_phase_authentication_methods_native_password_authentication.html |
|