-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Secure SMTP credentials #1938
Comments
|
Yes, are you sure you aren't thinking of I found a good article which appears to be based on RFCs. There exists both a username and password. More authoritatively,
https://datatracker.ietf.org/doc/html/rfc4616 As an example, when you generate a key for AWS / SES it looks something like [keyboard mashing] key: AOREHNK3UN34OU3OORS Imagine trying to hack something where the username is admin vs. something where it is instead roiehduyowaouwdhowuyhd but you don't know that. This is some kind of credential, and even if it is less sensitive than the secret, in my opinion it should be able to be a secret if users want it to be. The goal of this issue is to allow users to make that choice conveniently. |
Nextcloud itself does not treat |
Well that is just unfortunate.. thanks for looking into it. I am ok with that point as long as it has parity with other usernames. i.e. database username is not treated as sensitive. |
workaround: get the updated smtp config file from the MR and mount it over the existing smtp config file at /usr/src/nextcloud/config/smtp.config.php to support |
Usernames are part of credentials and are therefore also secrets. Add an env var
SMTP_NAME_FILE
so thatSMTP_NAME
can be used with Docker secrets.The text was updated successfully, but these errors were encountered: