[Security] Hash users.server_admin.password in config #1308

Closed
opened 2026-04-05 18:50:45 +02:00 by MrUnknownDE · 0 comments
Owner

Originally created by @dystopiandev on 6/26/2025

users.server_admin.password is configured in plain text, but it would be better to have it as a hash. This would typically use bcrypt or some other algo if pangolin uses something different under the hood.

For backwards compatibility, maybe introduce users.server_admin.passwordHash? Also make this the default installer behavior, and document how to generate the hash (work factor, etc.) for manual installation.

Reason: Plain text passwords are readable by anyone who gains access to the config file. If the file is leaked or compromised, the attacker immediately knows the password. On the other hand, since bcrypt is a one-way hashing algo, the original password cannot be directly recovered from the hash.

*Originally created by @dystopiandev on 6/26/2025* `users.server_admin.password` is configured in plain text, but it would be better to have it as a hash. This would typically use bcrypt or some other algo if pangolin uses something different under the hood. For backwards compatibility, maybe introduce `users.server_admin.passwordHash`? Also make this the default installer behavior, and document how to generate the hash (work factor, etc.) for manual installation. Reason: Plain text passwords are readable by anyone who gains access to the config file. If the file is leaked or compromised, the attacker immediately knows the password. On the other hand, since bcrypt is a one-way hashing algo, the original password cannot be directly recovered from the hash.
Sign in to join this conversation.
No Label
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: github/pangolin#1308