-
Some Apps are distributed with hard-coded client secrets, in my case owncloud, who distribute their desktop, android and ios clients with a hard coded client ids (but offer builds with custom ids to customers of their paid offering iirc). I'm not sure how common this is and if this is something we should even support. Or maybe we could just document how to manually configure such edge cases with manual database updates. Wdyt? |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments
-
Someone else had this question quite some time ago and then I couldn't even believe that they are doing something that stupid. If you use a static secret and expose it to the internet, you could simply not use any secret at all, it's pointless in that case and gives a false sense of security. They are doing it for probably only a very simple reason: Lazyness. A confidential client in such a case is just straight up the wrong decision for so many reasons. The fix would be very easy though. They would only need to switch these clients from The reason why Rauthy does not support this at all is because people are lazy. I have seen it too many times in the past that even Firewalls in enterprises had a password like There is a way to set such a given secret right now, but it's not straight forward at all and requires some manual work both via shell and on the DB directly. If you are interested in this, I could write a tiny guide on how to do make it work. I could add an optional value to the Usually, Apps will never do something like owncloud did and even MUST never do. Public secrets are not secrets and totally pointless. Apart from this case, I have never seen such silly thing in the real world. I don't get it why you would design something like this. Total nightmare from a security point of view. |
Beta Was this translation helpful? Give feedback.
-
Thanks for your thoughtful answer, I agree that it's not worth the effort of supporting this as a regular feature. I'd still be interested in how to set this up for my family. Since the keys are already published, making the inserts with the encrypted values available somewhere might save others some time, others have put out similar guides for authelia and authentik, including hashed secrets. So if you could find the time to supply some more guidance, it would be massively appreciated. But I agree, Owncloud should really switch to PKCE, which would also save them the hassle of building custom clients. |
Beta Was this translation helpful? Give feedback.
-
Rauthy uses cryptr under the hood for all values / files encryption. It has to be possible to show client secrets to an admin, so they are encrypted, not hashed. You must use Install
|
Beta Was this translation helpful? Give feedback.
Rauthy uses cryptr under the hood for all values / files encryption. It has to be possible to show client secrets to an admin, so they are encrypted, not hashed. You must use
cryptr
to encrypt the value, because it creates values with a super tiny header with some important metadata.Install
cryptr
cryptr
is not only a crate, but can be installed as an independent CLI. If you have Rust installed on your machine, it's as easy asIf not, have a look at the precompile binaries I added to the repo.
Make sure the command works with