-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use MD5 hash in mopidy.conf instead of plaintext passwords #27
Conversation
I think you'd definitely need something in the README explaining how users can create hash of their password. |
Relates to mopidy/mopidy-spotify#65 |
We should be really clear that the extra security this provides is minimal. If some has your md5 hash, they can likely get your password from that in a reasonable amount of time. Or they could just use the hash as-is to log in as you. |
Agreed that this isn't a huge leap in terms of added security. I guess using OAuth would be better, but can that be done through pyLast? And how do we feel about requiring the user to do setup in the browser? Maybe we'd need to have some sort of installation wizard that users can run for authentication? |
Yes, we could use their Web Application OAuth-style flow and have the user save the session key in their Mopidy config. It'd be very similar to what we already require users to do for Spotify and Soundcloud access where they must store the client_secret. pylast appears to support last.fm session keys. The session key should remain secret and if you don't trust the config file's security (which seems to be the concern but not something I'm personally convinced about) then you are still exposed. However, I do agree it's better since you have not exposed your actual password and can revoke the session key using the last.fm website. Additionally, there isn't much you can actually do through last.fm's API. However, it would take some work to do this. Proper Mopidy integration with the system keychain might be a better alternative since other extensions could also benefit from that. |
|
Keyrings are kind of supported (see mopidy/mopidy#116 (comment)) but I don't know how this works, if at all, when running Mopidy as a service. I think we had talk of added Maybe the session key support is worth doing here after all... |
Closing this as:
Sorry I didn't respond to this two years ago! |
This requires the user to put the MD5 of their password in the
Scrobbler
section ofmopidy.conf
instead of their plaintext password.