[Authentication] Applications storing secrets in configuration
Anders Rundgren
anders.rundgren at telia.com
Fri May 17 22:24:31 PDT 2013
On 2013-05-11 08:57, Stef Walter wrote:
> On 11.05.2013 08:18, Anders Rundgren wrote:
>> Having application-local secrets is fine but there are tons of applications
>> that rather needs ACL-protected secrets (keys).
>>
>> It would for example be awesome dropping the gazillion key-passwords
>> stored (usually in clear) in various config files when you for example
>> deploy TLS-using application servers like JBoss.
>
> This is *exactly* what this proposal solves. It allows application
> servers (and desktop applications) and such to encrypt such passwords in
> their configuration in a standard manner rather than placing them there
> in the clear.
This is not what I'm requesting. Statically configured passwords in config
files (encrypted or not), does not add anything to the security of the system,
they are only a nuisance. Such keys should IMO be managed by the OS including
the execution of private/secret-key operations.
thanx,
Anders
>
>> On the mobile scene, doesn't Android effectively offer sandboxed applications
>> including protected storage? Encrypting the data should IMO be a minor
>> OS addition
>
> Agreed, encryption is secondary to sandboxing. And this proposal
> facilitates that. Hence the support for the 'null' keys outlined below,
> so that when code is built for such a platform they can use the same
> library and code paths, but their data is not encrypted.
>
>> and not particularly related to GCR.
>
> This has nothing to do with GCR.
>
>> I guess this really boils down to what "market" you are looking at, right?
>>
>> Just my 2 öres.
>
> Thanks,
>
> Stef
>
>
>
More information about the Authentication
mailing list