mirror of
https://github.com/open-webui/open-webui.git
synced 2026-05-07 11:28:35 -05:00
[GH-ISSUE #14948] feat: Add zero-knowledge / PAKE-style login (e.g. SRP, OPAQUE, or WebAuthn) so passwords never leave the browser in clear text #32946
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @sidhant-tibrewal on GitHub (Jun 13, 2025).
Original GitHub issue: https://github.com/open-webui/open-webui/issues/14948
Check Existing Issues
Problem Description
Open WebUI’s login form sends the user’s raw password inside a TLS-protected JSON body:
POST /api/auth/login
This mirrors common practice on most web apps; TLS-in-transit plus server-side hashing (bcrypt/Argon2) is generally considered sufficient.
Why an extra layer matters in regulated networks
TLS termination & deep-packet inspection – Many company networks break and re-encrypt TLS at proxies, WAFs, or observability stacks. The decrypted request body can be:
• Logged verbatim by reverse proxies / APM tools
• Captured by insiders via packet captures on the internal network
• Written to application logs if sanitisation ever slips
• Zero-trust & “secrets never leave the endpoint” policies – Frameworks such as PCI DSS increasingly prefer that raw credentials never traverse any network hop, even inside a datacenter.
• User password reuse – Exposure of a single plain-text password inside corporate logs can cascade to other services if users reuse credentials.
Desired Solution you'd like
Implement (or provide pluggable support for) an authentication flow where the clear-text password never crosses the wire:
Simpler stop-gap (PBKDF2/SHA-256)
Password-authenticated key exchange with no server-stored plaintext-equivalent
Modern asymmetric PAKE, IETF draft-29
FIDO2 hardware-backed credentials
Any of these would satisfy “password never leaves browser in reusable form” requirements.
Alternatives Considered
No response
Additional Context
Impact / benefits
@tjbck commented on GitHub (Jun 13, 2025):
Interesting idea, would be nice to have it as an optional feature you can enable via env var, PR welcome!