Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Password stored in plaintext #56

Open
miclaraia opened this issue Oct 16, 2017 · 4 comments · May be fixed by #135
Open

Password stored in plaintext #56

miclaraia opened this issue Oct 16, 2017 · 4 comments · May be fixed by #135

Comments

@miclaraia
Copy link

Running panoptes configure stores the data that is entered in plain text on the host system. This means that if the user enters their username and password as prompted, their username and password are stored without encryption under $HOME/.panoptes/config.yml.

Once the cli has been configured with a username and password, running panoptes configure again prints this info in plaintext as the default value.

@adammcmaster
Copy link
Contributor

Yes, ideally we should do something better than that.

A quick search suggests the Python keyring module could be a good option.

@adammcmaster
Copy link
Contributor

From my initial testing, relying on the keyring module will make the CLI quite a bit harder to install on Linux. I think for now what I'll do is make it detect the module if it's installed, and if not it can prompt for the username/password each time rather than storing it in the config.

@miclaraia
Copy link
Author

I'm not sure about the details of how OAuth works, but would it be easier to instead issue and store a token that is set to expire after a longer period than the 60 minute bearer token? The effect would be the same that a user would remain logged in on their machine, but without risking their passwords. Furthermore a token could be revoked if it's compromised. We also wouldn't have to mess around with local dependencies relating to what keyring software is installed on a machine.

@adammcmaster
Copy link
Contributor

adammcmaster commented Jan 10, 2018 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants