- Appended to comment:
drh added on 2009-09-14 19:19:08:
New "scrub" command remove private information from a repository. Check-in 6c6a978a537
- Appended to comment:
rwilson added on 2009-09-14 16:40:15:
there should be some 'best practice faq' for fossil then, because if i store the same username/password in my local repository as is in the remote repository, then compromising my local also compromises the remote. also, i assumed that fossil was storing a hash of my password, so i chose a password that i use frequently on the internet. so, now that you know what that is, please don't drain my checking account.
- Appended to comment:
drh added on 2009-09-12 15:53:03:
There are two options:- User passwords can be stored cleartext in the local database but sent over the wire (during sync) as a hash.
- User passwords are stored has a hash in the local database but are sent in the clear over the wire during a sync.
We believe that (1) is the better choice since it requires an attacker to be able to see the local database in order to find passwords, and if the attacker can see the local database, then he has already compromised the machine. But with (2), the attack need only passively monitor network communications in order to steal passwords.
- Change resolution to "Works_As_Designed"
- Change status to "Closed"
- Change comment to "user passwords are stored in the fossil repository as plain text instead of a hash."
- Change foundin to "6021279637"
- Change private_contact to "2359089ef753bc96e12743e299243d5232c749fa"
- Change severity to "Important"
- Change status to "Open"
- Change title to "user passwords are stored in plain text"
- Change type to "Feature_Request"