-
Notifications
You must be signed in to change notification settings - Fork 122
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Request: Stronger initial login credentials #206
Comments
grocy is a PHP app, not a webserver - so this is technically completely out of control of grocy.
If we do that, and grocy is set up to be reachable from the public internet, everyone could (yes, theoretically, most probably not really a problem in reality) catch up there and create those initial credentials. |
Yep, agreed for both of those 👍 Could you transfer this to |
grocy/docs#7 could make sense to also transfer to |
This comment was marked as resolved.
This comment was marked as resolved.
I wonder whether the running container ID (not the image ID) could be introspected and used as the default admin password. There could be a question about whether the user wants to update that on first-login -- but it'd be fine to choose not to. That wouldn't be perfect, but the container ID is information that random systems and/or people scanning the network for known applications shouldn't be able to obtain (unless they have some login access to the host machine already), and that a person should hopefully be able to access easily during first-time Grocy container startup (todo: check -- is that true?). |
Another option could be storing an initial password (or better the hash thereof) in grocy.env, but implementing that would still require some effort I guess. |
As it becomes easier to use and deploy
grocy
, it makes sense to improve the security of the default login credentials.There's a tricky balance here; we want to reduce the possibility for unauthorized access to a grocy instance, while allowing users to restore access to the application and data if they forget their password in future.
It may be reasonable to assume that a person running grocy on a home device would be able to access the device and/or filesystem for truly urgent for recovery purposes.
Logging into the device and/or accessing the filesystem directly might also be able to provide 'in-person-only' reset workflows.
A suggested new-instance setup phase would involve:
There are a lot of possible tradeoffs and design options here; we might be able to discover how other projects achieve this and get some ideas from them (linuxserver, for example?).
The text was updated successfully, but these errors were encountered: