Bug 1279942

Summary: targetcli truncates password when it is longer than 255 characters
Product: Red Hat Enterprise Linux 7 Reporter: Bruno Goncalves <bgoncalv>
Component: targetcliAssignee: Maurizio Lombardi <mlombard>
Status: CLOSED WONTFIX QA Contact: Bruno Goncalves <bgoncalv>
Severity: medium Docs Contact:
Priority: medium    
Version: 7.2   
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-12-15 07:38:17 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1295577, 1313485    

Description Bruno Goncalves 2015-11-10 14:38:12 UTC
Description of problem:
Trying to configure CHAP password longer than 255 characters, only the first 255 characters are used for password.

Version-Release number of selected component (if applicable):
targetcli-2.1.fb41-3.el7.noarch

How reproducible:
100%

Steps to Reproduce:
1.Create a password with 256 characters
# export password=`cat /dev/urandom | tr -dc 'a-zA-Z0-9' | head -c 256`
# echo ${#password}
256

2.Create an iSCSI target
# targetcli /iscsi create iqn.2009-10.com.redhat:storage-1

3. Set the CHAP password
# targetcli /iscsi/iqn.2009-10.com.redhat:storage-1/tpg1 set auth password=$password
Parameter password is now 'JlNkQ1xmnhsYCukUIl5Ors8tiLNGnPu6GmUxhhidLvSuEEaZWqctB2rljEEC0xD1MuoqAgYunW33CWF1xncRZ93ns6wGbHKKKph6rPjYPB9mUudQKIHW2wtfYvnktkGKTnOZhjVnc4irBcxMxCLtVBobp9MtOmAee4gfHxDuhuScPKkb2DjoEtUBZ3h0xZ7RkpPqv8JGCK5BgKYo9uibwpGNgcK4ya56tiIEEesF5yGilqit3tfRGUJJBLeWJSz'.

# echo $?
0

4. Check the last character was not set
# echo $password
JlNkQ1xmnhsYCukUIl5Ors8tiLNGnPu6GmUxhhidLvSuEEaZWqctB2rljEEC0xD1MuoqAgYunW33CWF1xncRZ93ns6wGbHKKKph6rPjYPB9mUudQKIHW2wtfYvnktkGKTnOZhjVnc4irBcxMxCLtVBobp9MtOmAee4gfHxDuhuScPKkb2DjoEtUBZ3h0xZ7RkpPqv8JGCK5BgKYo9uibwpGNgcK4ya56tiIEEesF5yGilqit3tfRGUJJBLeWJSze

Expected results:
targetcli should return some error informing the password is too long or provide some warning informing the password will be truncated.




The problem also happens with userid longer than 255.

Comment 6 RHEL Program Management 2020-12-15 07:38:17 UTC
After evaluating this issue, there are no plans to address it further or fix it in an upcoming release.  Therefore, it is being closed.  If plans change such that this issue will be fixed in an upcoming release, then the bug can be reopened.