Security Issue in config.xml

  • Hi there,


    I'm not sure whether it's the right place to post but github said it's best to post here first. So here I am.

    I just realized that if you set up an email account in order to get notifications the authentication password is stored in plain text which I think is not a good practice. I believe it would be good to had a hash in here instead of plain text.


    So let's say if somebody is stealing my NAS, he/she can look inside the code and access my mailbox.


    Hope somebody can modify that...


    Enjoy 2021


    Fr3sh

    • Offizieller Beitrag

    So let's say if somebody is stealing my NAS, he/she can look inside the code and access my mailbox.

    But if they have your NAS, they have the code and salt to decrypt it.

    omv 7.0.5-1 sandworm | 64 bit | 6.8 proxmox kernel

    plugins :: omvextrasorg 7.0 | kvm 7.0.13 | compose 7.1.4 | k8s 7.1.0-3 | cputemp 7.0.1 | mergerfs 7.0.4


    omv-extras.org plugins source code and issue tracker - github - changelogs


    Please try ctrl-shift-R and read this before posting a question.

    Please put your OMV system details in your signature.
    Please don't PM for support... Too many PMs!

  • email account in order to get notifications the authentication password is stored in plain tex

    Most email accounts are free of charge, if you are concerned about security, just create an email account for this purpose.

    omv 6.9.6-2 (Shaitan) on RPi CM4/4GB with 64bit Kernel 6.1.21-v8+

    2x 6TB 3.5'' HDDs (CMR) formatted with ext4 via 2port PCIe SATA card with ASM1061R chipset providing hardware supported RAID1


    omv 6.9.3-1 (Shaitan) on RPi4/4GB with 32bit Kernel 5.10.63 and WittyPi 3 V2 RTC HAT

    2x 3TB 3.5'' HDDs (CMR) formatted with ext4 in Icy Box IB-RD3662-C31 / hardware supported RAID1

    For Read/Write performance of SMB shares hosted on this hardware see forum here

  • But if they have your NAS, they have the code and salt to decrypt it.

    I'm more a hacker than a developer and I understand you can't send the password to your mail sever as a "hash" so you'll have to have a function reverting that "hash". That function being in the code you could use it to revert the hash and gain access to the password...

    Just wonder if there was a way to protect that password...
    As a workaround I use a dummy email account but to me it's a workaround.

    Any developer/programmer giving a hint on how to do this ? Just so I can learn a bit more...


    Have a fun day

    • Offizieller Beitrag

    Any developer/programmer giving a hint on how to do this ?

    Your password stored in Linux (in /etc/shadow) is a one way hash. There is no way to decrypt it. When you enter your password, it is encrypted and if the new encrypted hash matches what is in /etc/shadow, it is correct. We can't do this for passwords stored in OMV's database because the passwords are used without someone entering a new one. So, there really isn't a good way to improve this.

    omv 7.0.5-1 sandworm | 64 bit | 6.8 proxmox kernel

    plugins :: omvextrasorg 7.0 | kvm 7.0.13 | compose 7.1.4 | k8s 7.1.0-3 | cputemp 7.0.1 | mergerfs 7.0.4


    omv-extras.org plugins source code and issue tracker - github - changelogs


    Please try ctrl-shift-R and read this before posting a question.

    Please put your OMV system details in your signature.
    Please don't PM for support... Too many PMs!

  • If the linux password is weak, there are ways to crack them (john the ripper or hashcat) but that's not the point.
    I thought you could encrypt the omv drive but you would have to enter a password each time you reboot which is not convenient for a NAS.


    I guess you're right, there is no easy way to improve this. Could be a good research topic though

    • Offizieller Beitrag

    If the linux password is weak, there are ways to crack them (john the ripper or hashcat) but that's not the point.

    Agreed. I played with both of those but they aren't decrypting them. It is either using a known hash list or encrypting each password and checking against the hash.

    Could be a good research topic though

    Agreed. I'm sure there is some better way. I would be very interested in that.

    omv 7.0.5-1 sandworm | 64 bit | 6.8 proxmox kernel

    plugins :: omvextrasorg 7.0 | kvm 7.0.13 | compose 7.1.4 | k8s 7.1.0-3 | cputemp 7.0.1 | mergerfs 7.0.4


    omv-extras.org plugins source code and issue tracker - github - changelogs


    Please try ctrl-shift-R and read this before posting a question.

    Please put your OMV system details in your signature.
    Please don't PM for support... Too many PMs!

Jetzt mitmachen!

Sie haben noch kein Benutzerkonto auf unserer Seite? Registrieren Sie sich kostenlos und nehmen Sie an unserer Community teil!