-
-
Notifications
You must be signed in to change notification settings - Fork 24
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
config.md does not hint at passwords being stored in clear text #44
Comments
the constrain is that, unless using OAuth (for which there is a pending issue #25 and which itself will need to store secret keys) we need to be able to recover the password, would stocking the password as a hash of a symmetric algorithm (like base64) address your concern? |
No, a symmetric hash does not address the concern, but this is probably a separate issue. Thanks for telling the users more prominently about the caveats with this. Closing in favour of #45. |
The
config.md
documentation document suggests users to store their account credentials for allowing write operations.The special page
write_operations.md
mentions the fact of clear text storage, but far away even fromREADME.md
.Would it be possible to provide the password as a secure hash to the remote auth endpoint instead?
The text was updated successfully, but these errors were encountered: