On 3/12/20 11:14 AM, mohd wrote: > The one who has direct access to the filesystem of the docker container. > And also want to know at ubuntu levelĀ for filesystem.
I fully agree with what Brian said, just want to add another opinion: I commonly see this as a mis- or overinterpretation of security guidelines, such as "You should not have plaintext secrets". I think such statements are primarily targeted at user databases where you don't have to have plaintext secrets at all. You can (and should) use hashing or password derivation algorithms such as PBKDF2, scrypt and bcrypt. However, that's a totally different use case to what Alertmanager has to do here: Alertmanager behaves as an SMTP client. It therefore needs to have a usable, unencrypted secret at some point. Every encryption or obfuscation you add on top is just that -- obfuscation, e.g. Security by obscurity. You can add multiple layers of complexity and encryption on top. At some point, you will still have to store the master-master-master decryption key somewhere and haven't reached any real improvement at all. There is a single (weak) argument that I buy regarding plaintext passwords: They could be stolen by "shoulder surfing". There probably is an easy remedy as well: Just make them long and cryptic enough. There is no reason not to when talking about machine-to-machine authentication. There is also a wide variety of "enterprise tools" which try to fool you into believing that some magic method for solving this problem exists. In practice, checking the "use encrypted passwords" checkbox usually means encrypting passwords with some static key in the binary. In my opinion, this just adds complexity. It does not add a security boundary. There are two things which you *can* do to improve security: - Use the principle of least privilege. In this case: Ensure that alertmanager config file permissions are set in a way that it only allows access to the user running alertmanager (e.g. chown alertmanager:alertmanager, chmod 600). Also ensure that only those people have super-user permissions on your machine who really need this. - Use separation of duties. In this case: Use a password which is only used for authentication against your SMTP server. As a drastic contrast: Do not use the same password as for your root account or something like that. Kind regards, Christian -- You received this message because you are subscribed to the Google Groups "Prometheus Users" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/prometheus-users/d36b8de4-2095-5e2d-fbdc-5be5138592df%40hoffmann-christian.info.

