Message boards : Number crunching : lookup_account.xml - cleartext acckey?
Author | Message |
---|---|
apo Send message Joined: 19 Mar 07 Posts: 10 Credit: 759,409 RAC: 0 |
hey :) is it true that lookup_account.xml in the boinc root dir does contain the account key without any encryption? so everyone who has access to my computer can take my account? cheers felix |
Sebastian Gosenheimer Send message Joined: 21 Oct 06 Posts: 14 Credit: 1,090,091 RAC: 0 |
Hmm, i take a look by my own and yes you are really right. Maybe in future this acckey could be encrypted? best regards, sebastian hey :) If it's not broken, don't fix it |
apo Send message Joined: 19 Mar 07 Posts: 10 Credit: 759,409 RAC: 0 |
It would be nice to have only 1 file containing all login and project data for every project.. this file should be encrypted of course. as a result of this it would be possible to copy this file to another computer so that no login data would be needed to attach new computers. just 1 encrypted file to becopied around :) (i mentioned this point in another thread. how to add computers without giving around youre login..) ahhhh, it would fix all my problems (concerning boinc ;-D) |
Christoph Send message Joined: 10 Dec 05 Posts: 57 Credit: 1,512,386 RAC: 0 |
Every encryption can be decrypted, except if the encryption key is not stored on your disk. That is, you have to enter everytime the password when you start BOINC. And even then, one could read the password out of the memory. |
apo Send message Joined: 19 Mar 07 Posts: 10 Credit: 759,409 RAC: 0 |
So let's store it online. The decrypted key could be stored in memory only.. It should not be 100% safe but at the moment it's just too easy to steal an account. |
FluffyChicken Send message Joined: 1 Nov 05 Posts: 1260 Credit: 369,635 RAC: 0 |
IT always been like that, it has been suggested to BOINC developers many time I believe and I know I have. I forget the silly reasons for not encrypting it at least slighty. Ok so it can be decrypted but some of the higer strength used take a long time, hence why there are DC (e.g. BOINC) projects hacking the stuff. As for on the server, well if they where going to bother to decrypt a file, then they would go to the bother to snoop/listen to your network connection and get it that way. But you need to be on the BOINC forums or 'dev' lists as it's really down to them, not Rosetta@Home. The worst part is the password to allow remote access to your boinc program is also just an unencrypted text file. Team mauisun.org |
Message boards :
Number crunching :
lookup_account.xml - cleartext acckey?
©2024 University of Washington
https://www.bakerlab.org