Thus said Kevin Martin on Sat, 01 Feb 2014 09:14:20 +0000:

> How does fossil authenticate with a  server, does it send the password
> plaintext? HTTP Basic Auth does!

It's not encrypted, no, only base64 encoded.

> I'm not  sure whether this  should just  happen by default  unless the
> connection is HTTPS as defaulting  to sending plaintext auth data over
> HTTP seems like a bad idea.

This is why I  asked if it was even a good idea  to be done. Using Basic
Authorization basically means transmitting a password unencrypted if the
connection  is  not wrapped  in  SSL.  So  perhaps  if Fossil  is  being
used  with  HTTP  it  should prompt  before  automatically  sending  the
Authorization? Should this decision be stored?

> Also  I  never knew  about  prefixing  the  password  with #,  for  me
> documenting that is enough. I'm happy now using it as is.

I  think  a   command  line  option  would  be   more  appropriate  (and
self-documenting) because it  has less surprise factor. If  I don't know
about the # option, and I set my password to ``#pass'', I will be unable
to clone with  my credentials because Fossil will strip  it off and send
``pass'' without the #.

My  original attempt  was  simply to  add an  option  for cloning  which
allowed the user to turn on the basic auth (as opposed to the use of #):

fossil clone --httpauth http://user@host/project

Andy
-- 
TAI64 timestamp: 4000000052ed2937


_______________________________________________
fossil-users mailing list
fossil-users@lists.fossil-scm.org
http://lists.fossil-scm.org:8080/cgi-bin/mailman/listinfo/fossil-users

Reply via email to