By default, connection to the mysql server implements an authentication protocol [1] that relies on SHA1 internally between the client and the server.
Since mariadb 10.1.21, a new authentication plugin is available in MariaDB that allows a client to authenticate to the server by using a more secure authentication scheme that uses ed25519 cryptographic primitives.
This launchpad bug tracks the necessary updates to implement in OpenStack to use ed25519 authentication on tripleo-deployed stacks.
By default, connection to the mysql server implements an authentication protocol [1] that relies on SHA1 internally between the client and the server.
Since mariadb 10.1.21, a new authentication plugin is available in MariaDB that allows a client to authenticate to the server by using a more secure authentication scheme that uses ed25519 cryptographic primitives.
This launchpad bug tracks the necessary updates to implement in OpenStack to use ed25519 authentication on tripleo-deployed stacks.