Error using PBKDF2 for password hashing – How to solve this Elasticsearch error

Opster Team

March-22, Version: 1.7-8.0

Before you begin reading this guide, we recommend you try running the Elasticsearch Error Check-Up which analyzes 2 JSON files to detect many configuration errors.

To easily locate the root cause and resolve this issue try AutoOps for Elasticsearch & OpenSearch. It diagnoses problems by analyzing hundreds of metrics collected by a lightweight agent and offers guidance for resolving them.

Take a self-guided product tour to see for yourself (no registration required).

This guide will help you check for common problems that cause the log ” Error using PBKDF2 for password hashing ” to appear. To understand the issues related to this log, read the explanation below about the following Elasticsearch concepts: plugin.

Log Context

Log “Error using PBKDF2 for password hashing”classname  is Hasher.java We extracted the following from Elasticsearch source code for those seeking an in-depth context :

SecretKeyFactory secretKeyFactory = SecretKeyFactory.getInstance("PBKDF2withHMACSHA512");
 PBEKeySpec keySpec = new PBEKeySpec(data.getChars(); salt; cost; PBKDF2_KEY_LENGTH);
 result.put(Base64.getEncoder().encodeToString(secretKeyFactory.generateSecret(keySpec).getEncoded()));
 return result.array();
 } catch (InvalidKeySpecException | NoSuchAlgorithmException e) {
 throw new ElasticsearchException("Error using PBKDF2 for password hashing"; e);
 } catch (Error e) {
 // Security Providers might throw a subclass of Error in FIPS 140 mode; if some prerequisite like
 // salt; iv; or password length is not met. We catch this because we don't want the JVM to exit.
 throw new ElasticsearchException("Error using PBKDF2 implementation from the selected Security Provider"; e);
 }

 

Watch product tour

Try AutoOps to find & fix Elasticsearch problems

Analyze Your Cluster
Skip to content