-
Suggestion
-
Resolution: Done
Hello everyone,
We’re happy to inform you that we’ve released Crowd 4.2 which encrypts all passwords to external systems that are stored in the Crowd’s database. These are:
- Passwords that allows Crowd to connect to LDAP / AD directory
- Remote Crowd directory application passwords
- Azure AD web application keys
- SMTP mail passwords
- Proxy passwords
We’d like to emphasize that the encryption of application.password stored in crowd.properties file which is used by clients connecting to Crowd is not in the scope of this ticket. This suggestion is tracked in another ticket: CWD-5649.
Best regards,
Crowd team
Anywhere that a password is stored in plaintext in Crowd's database, it should be encrypted. This will not stop a knowledgeable attacker, but may slow them down.
- blocks
-
JRASERVER-38609 Crowd User Directory application password stored in plain text
-
- Closed
-
- incorporates
-
CWD-1434 Don't store the SMTP Server password in clear text
- Closed
- is duplicated by
-
CWD-2200 LDAP directory user DN password
- Closed
-
CWD-2838 crowd.properties password entry in plain text
- Closed
-
CWD-3841 Mail Server Password Should be Encrypted in The Database
- Closed
- relates to
-
BSERV-4819 Stash uses plain text passwords in the database for the Crowd User Directory
-
- Closed
-
-
JRASERVER-72470 Jira stalls due to contention on CachedEncryptor.decrypt
-
- Closed
-
-
JRASERVER-45612 Active Directory/LDAP credentials stored in database in cleartext
-
- Closed
-
-
CONFSERVER-31605 LDAP and Active Directory credentials are stored in plain text in database
-
- Closed
-
-
CONFCLOUD-31605 LDAP credentials are stored in plain text in database
- Closed
-
LEM-359 Loading...
- is cloned by
-
KRAK-3519 Loading...
- mentioned in
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
I found out this ticket while going around database for Active Directory reporting (using cwd_directory & cwd_directory_attribute).
I had to double check the password in KeePass to be sure it was the actual production password.
We are in 2019 now. In 2019 it is completely insane to assume that clear text passwords are OK. Final point.
Use case 1 : Reporting from direct access to database
It is when someone wants to have direct reporting means from database endpoint. Which is my case.
Of course you could/should have a read only database user and prevent it from accessing sensitive tables.
But how in the first place do you know about that? How one is aware of where passwords are "hidden" when willing to secure the database for reporting purposes?
A very obvious method is to store credentials using a dedicated mean where only the Jira system account is able to decrypt the passwords or using a storage/key outside of the database. This could be a key on file system (XML whatever) requiring system account / root access on file system.
Why ? Because a server is not always compromised by gaining root access on the filesystem but also often by misconfigured securities.
Use case 2 : Interception by third parties
Another stupid case, the password is in plain text in the PostgreSQL database dumps. Which is my case too.
No one ever should be allowed to read a password in plain text. Even if this involves being a backup operator.
Only allowed situation for clear text password
Post-it at the back of a keyword. Just Kidding.
About challenge-response type authentication.
Is there anything planned after 5 years when dealing with Windows LDAP servers?