-
Notifications
You must be signed in to change notification settings - Fork 349
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The "password" auth system stores password as plaintext! #371
Comments
Yes, in plaintext, by design. I know this sounds scary at first, but consider the following:
Put all of those together, and there's little value and a good bit of cost to hashing/bcrypting these passwords. If they were broad-purpose user-selected passwords, that would be a very different story. |
Thanks for the quick reply. Having spent only a few hours with the UI and source code I have noticed two different "user" models:
For the But the password stored in the |
Hi @crazyscientist you're right about where it's stored, but to be clear |
While this is true for the publicly available service, which only offers Google and GitHub, for a self-hosted server this might not be true. It only takes two env. variables to force the server to use PS: Sorry for dragging you into this discussion. My original intent was only to share my discovery with people inclined to host their own service and disable 3rd party authentication services. |
A comment in #222 gives instructions on how to create a user for local authentication (aka. password auth system). This instruction is shared in #244. Also, #268 encourages people to use the password auth system.
There is just one problem: The password is stored as plaintext in the database.
Example:
The text was updated successfully, but these errors were encountered: