https://projects.ecoinformatics.org/ecoinfo/https://projects.ecoinformatics.org/ecoinfo/ecoinfo/favicon.ico?14691340362008-07-25T20:30:26ZEcoinformatics RedmineMetacat - Bug #3367: Harvester stores passwords in clear texthttps://projects.ecoinformatics.org/ecoinfo/issues/3367?journal_id=115812008-07-25T20:30:26ZMatt Jonesjones@nceas.ucsb.edu
<ul></ul><p>It would be best if we didn't store this password at all. Reassigning to Duane to determine why we are storing redundant password in the database.</p> Metacat - Bug #3367: Harvester stores passwords in clear texthttps://projects.ecoinformatics.org/ecoinfo/issues/3367?journal_id=115822008-07-28T16:07:10ZDuane Costadcosta@lternet.edu
<ul></ul><p>Matt,</p>
<p>Harvester stores LDAP DN/password information for each site so that it can run an automated login (via the Metacat client) prior to harvesting documents for a site.</p>
<p>From your comment it sounds like you might have been thinking that Harvester stores the metacat database username and password, but this is not the case.</p>
<p>I agree that the LDAP passwords stored in the database should be encoded rather than in clear text.</p>
<p>Thanks,<br />Duane</p> Metacat - Bug #3367: Harvester stores passwords in clear texthttps://projects.ecoinformatics.org/ecoinfo/issues/3367?journal_id=115832008-07-29T16:44:12ZMark Servillaservilla@lternet.edu
<ul></ul><p>I believe the need for the user passwords in the database is for Harvester to interact with Metacat on the user's behalf - that is, to upload the EML document on behalf of the user without an interactive login session by the user. I agree that user passwords should not be stored in clear text. MD5s, however, are hash values and cannot be used in this instance because they cannot be converted back to the original password for subsequent interaction with Metacat. I would suggest that the Harvester support the optional storage of encrypted passwords through the use of a local private key and a preferred encryption algorithm. Two use cases would be affected: 1) the user setup of a harvest account would result in the initial encryption of the password and 2) the harvest process would dynamically decrypt each password for the duration of the session for use with Metacat. In this case, only the local private key would have to be protected. Just my two cents...</p>
<p>Sincerely,<br />Mark</p> Metacat - Bug #3367: Harvester stores passwords in clear texthttps://projects.ecoinformatics.org/ecoinfo/issues/3367?journal_id=115842008-07-29T17:39:23ZMatt Jonesjones@nceas.ucsb.edu
<ul></ul><p>I thought this was the case. We discussed using a private key to encrypt the password, as we're trying to tighten up these issues in other places in metacat. However, it seems to me that we don't really need either in this case. The current process is to:</p>
<p>1) authenticate user upon harvest registration<br />2) store user password if valid<br />3) periodically harvest documents and insert, update, delete as that user</p>
<p>However, the key here is that metacat is simply keeping track of who it has previously authenticated, and gains no new information by storing the password. Instead, it seems to me that Metacat could simply store the account name and a 'validated' flag, then do the insertions as that user without further logging in. This would solve two potential problems. First, the password list is vulnerable to perusal if the db were to be compromised. Second, if the user changes their password in LDAP, the harvest will fail. Both of these would be solved by eliminating the stored password in favor of a simple 'authenticated' flag.</p>
<p>I suspect the reason this is done is that MetacatClient is used to do much of the document insertion, etc. So the system may need to be architected somewhat differently, such as by using an IPC-based version of MetacatClient that wouldn't communicate over http. Such a client has been planned since we first created the MetacatClient, but has never been implemented.</p> Metacat - Bug #3367: Harvester stores passwords in clear texthttps://projects.ecoinformatics.org/ecoinfo/issues/3367?journal_id=115852013-03-27T21:23:12ZRedmine Admin
<ul></ul><p>Original Bugzilla ID was 3367</p>