You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Mar 20, 2019. It is now read-only.
When displaying the database login credentials for the modules, the current password is retrieved and inserted into the page. Normal credential configuration should provide a way to SET the password but not retrieve it through the web interface.
In addition the yubiauth password is stored in the database configuration string. which is visible on the database screen and the configuration file in advanced. The password should be broken out and protected.
The text was updated successfully, but these errors were encountered:
This is somewhat by design as the external applications keep the passwords in the config files, and a feature of YubiAdmin is being able to edit these files. YubiAdmin is an admin interface only intended for use by an administrator as a replacement for editing the configuration files by hand (which would similarly expose the passwords on the screen).
I do agree that it would be an improvement if the passwords were hidden from view, but with the amount of effort required for this (changing the external applications for the pages you listed and some that you didn't list) I do not see it being warranted. I'll leave the issue open for future consideration.
I'm not certain what kind of passwords these are, but another option is to not use cleartext passwords at all, but instead use PBKDF2'd password and store the resulting hash (in hex) in these configuration files instead.
However, this approach doesn't work for some kind of passwords that needs to be presented to other software, and probably these passwords are of this kind.
Maybe there are other options to handle database authentication? Passwords are in general a problem, so if it is possible to recommend something else instead, that may be better. Any publickey authentication possible?
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
When displaying the database login credentials for the modules, the current password is retrieved and inserted into the page. Normal credential configuration should provide a way to SET the password but not retrieve it through the web interface.
Pages affected:
Yubiadmin -> General (/admin/general)
KSM -> Database (/ksm/database)
Validation -> database (/val/database)
In addition the yubiauth password is stored in the database configuration string. which is visible on the database screen and the configuration file in advanced. The password should be broken out and protected.
The text was updated successfully, but these errors were encountered: