On Sat, Feb 1, 2014 at 1:29 PM, Andy Bradford <amb-fos...@bradfords.org>wrote:

> Thus said "Andy Bradford" on 01 Feb 2014 10:04:23 -0700:
>
> > Thus said Kevin Martin on Sat, 01 Feb 2014 09:14:20 +0000:
> >
> > > How  does  fossil authenticate  with  a  server,  does it  send  the
> > > password plaintext? HTTP Basic Auth does!
> >
> > It's not encrypted, no, only base64 encoded.
>
> It seems I misunderstood what Mr.  Martin was asking here. Fossil uses a
> nonce and the password and sends only the SHA1 hash across the wire:
>
> http://www.fossil-scm.org/index.html/doc/trunk/www/password.wiki
>

There are some caveats mentioned in the documentAndy linked to, that you
should pay attention to:

1. When a user logs into Fossil using the web interface, the login name and
password are sent in the clear to the server.

2. If the USER.PW on the server holds a cleartext password, then the server
will also accept a login-card signature that is constructed using either
the cleartext password ....

The second item relates to compatability with older clients. Although it is
unlikely anyone is still using Fossil versions that old (older than
010-01-11<http://www.fossil-scm.org/index.html/timeline?c=2010-01-10+20:56:30>),
an old enough repository could possibly have cleartext passwords, so I
would recomend converting the passwords as described in the document.

Also, from reading the description of the sync protocol, I'm not sure how
safe the nounce is. The calculation appears to not make use of the current
time nor other value reasonably unique to the session.
_______________________________________________
fossil-users mailing list
fossil-users@lists.fossil-scm.org
http://lists.fossil-scm.org:8080/cgi-bin/mailman/listinfo/fossil-users

Reply via email to