Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

JIRA password is stored clear text in config file #13

Open
watsoncj opened this issue Feb 28, 2018 · 12 comments
Open

JIRA password is stored clear text in config file #13

watsoncj opened this issue Feb 28, 2018 · 12 comments

Comments

@watsoncj
Copy link

watsoncj commented Feb 28, 2018

Likely a blocker for many users. This password is often the same as the corporate VPN.

Storing the password in the user's keychain seems like a better option than #1.

@watsoncj
Copy link
Author

Consider something like keytar for cross-platform keychain access.

@miguelmich
Copy link
Member

Great idea @watsoncj, I'll use it definitively!

@decibyte
Copy link

This is definitely a show stopper for me. Let me know if there is anything I can do to help (that doesn't involve coding).

@miguelmich
Copy link
Member

I'll be working on the implementation of this fix today hopefully there will be a new release with this hotfix today :)

@miguelmich
Copy link
Member

miguelmich commented Mar 14, 2018

@watsoncj I was working on this but then I realized that users from Linux will have to install an additional lib in order to use the CLI, I'll make a research to see if we can find a 100% node cross-platform solution.

PS: I don't know what do you guys think about this?

@valentijnscholten
Copy link

Alternative could to use OAuth, but that's more complicated and requires cooperation from the JIRA Admins. What about only having the password in memory. So don't store it, but ask it once on startup or on the first command executed?

@miguelmich
Copy link
Member

@valentijnscholten I like that idea, I will explore more about it, what I'm thinking is since this config file is stored in the user home directory as well as the ssh keys are stored in, one would think this is a safe place, I mean, if an attacker manages to reach your home directory you're in more serious problems, but I agree that having the JIRA password stored without any obfuscation at least is concerning even for me (I don't even like seeing my passwords without the *** characters lol) on the other hand I also think that if you're not in your machine you wouldn't want to have that data stored locally, so your solution makes total sense to me.

I'll take a look at how to store recurring data in memory and if anyone else has any other better idea you're welcome to participate :)

@valentijnscholten
Copy link

Private keys are usually protected by a password which is asked for onle once on startup and then cached in memory :)

@xdhmoore
Copy link

If an attacker reaches your home directory, you have serious problems, but if your home directory contains an SSO password that gets them admin access to all of the production applications you manage, you have even more serious problems.

@iinuwa
Copy link
Contributor

iinuwa commented Dec 17, 2020

I don't know if Jira Server has this option, but Jira Cloud has an option to create an API token that is separate from your password. It still gives you access to all the API features that your user has access to, but it's scoped to Jira rather than all of the apps that your domain/organization credentials provide access to.

@valentijnscholten
Copy link

Api tokens were just introduced in jira server 8.14. But do not work with basic authentication. They need be sent as bearer token.

@iinuwa
Copy link
Contributor

iinuwa commented Jan 3, 2021

Oh, OK. My API token for Jira Cloud is working without modification to jira-cli. @valentijnscholten, are you saying that Jira Server API tokens are not working with jira-cli?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

6 participants