Den tors 20 jan. 2022 kl 14:57 skrev Mark Phippard <markp...@gmail.com>:

> I was in the process of replying to Karl's email and why I do not
> think his approach is the way to go when I had the following idea.
>
> What if we add a new password storage module in the spirit of the
> gnome-keyring, gpg modules that stores the password in some kind of
> obfuscated format in the auth folder?
>
> This module could be built by default on *nix but also support a
> configure option to disable building it. Also if the library itself is
> just not present at runtime then it would also not be available.
>
> It would become a new password-stores option in the config file so we
> already have a mechanism for enabling or disabling it via that file as
> well.
>
> For purposes of all of the other warnings we still support this would
> NOT be considered a plain text password.
>
> How we obfuscate would be up to whoever writes the code. I think
> Base64 would be fine but we could also use something like AES where we
> use the realm-string or some other value we know as the key. This
> would not be truly secure but it does help protect against trivial
> observation and discovery.
>
> This would make password storage available by default on Linux, but
> still give Disto maintainers and anyone else maintaining a system
> options to completely disable it if that is their desire.
>
> I will also still reply to Karl's email
>
> Thanks
>
> Mark
>

Is this something that can be added to / merged with issue 4145[1]: Master
passphrase and encrypted credentials cache

/Daniel Sahlberg

[1] https://issues.apache.org/jira/browse/SVN-4145

Reply via email to