Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
T
tails
  • Project overview
    • Project overview
    • Details
    • Activity
    • Releases
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 947
    • Issues 947
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
  • Merge Requests 8
    • Merge Requests 8
  • CI / CD
    • CI / CD
    • Pipelines
    • Jobs
    • Schedules
  • Operations
    • Operations
    • Incidents
    • Environments
  • Analytics
    • Analytics
    • CI / CD
    • Repository
    • Value Stream
  • Members
    • Members
  • Collapse sidebar
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
  • tails
  • tails
  • Issues
  • #10275

Closed
Open
Opened Sep 26, 2015 by anonym@anonymMaintainer

Automatically test that any administration password is not leaked in plaintext into the system

Originally created by @anonym on #10275 (Redmine)

We manually test that $TAILS_USER_PASSWORD is not set in some (shell) environments, but we could perhaps take it one step further by dumping the testing VMs memory and grep the dump for the password? I’m not sure how valid that is vs encodings, etc. so I guess we’d need an anti-test verifying that the approach works for other environment variables.

Parent Task: #10250 (closed)

Edited May 15, 2020 by anonym
To upload designs, you'll need to enable LFS and have admin enable hashed storage. More information
Assignee
Assign to
Tails_2.7
Milestone
Tails_2.7 (Past due)
Assign milestone
Time tracking
None
Due date
None
Reference: tails/tails#10275