Thanks Christian for the timely response. Appreciate it.

On Monday, February 1, 2021 at 11:09:17 PM UTC+5:30 Christian Hoffmann 
wrote:

> Hi,
>
> On 2021-02-01 14:39, vinoth dharmalingam wrote:
> > We see the basic auth/bearer token details are being stored in the 
> > prometheus.yaml/password file in a plain text for target scraping. Our 
> > cyber process does not allow this plain storage. Are there ways for 
> > storing it in the encrypted format similar to how bcrypt encryption 
> > supported in web.config.file for HTTP APIs (version 2.24)?
> If you are talking about credentials which are required for Prometheus 
> to access other endpoints as a client, then the answer is "no" for 
> Prometheus and the answer is most likely "no" for any other software as 
> well, as far as I know.
>
> I have often seen this issue come up: Some IT policy forbids storing 
> plaintext passwords without any context.
>
> It is easily possible (and a good policy!) to avoid storing plaintext 
> passwords when acting as a server or account database, e.g. when the 
> server has to verify a user- or client-supplied secret. This can be 
> solved by using plain hashes (outdated, as it is prone to quick 
> cracking/rainbow tables) or more advanced schemes such as pbkdf2, bcrypt 
> and scrypt.
>
> However, when Prometheus has to prove to another endpoint that it 
> possesses a certain secret, this won't work as hash functions, bcrypt 
> etc. are designed to be non-reversible. In theorey, you could encrypt 
> such passwords and lots of Enterprise software supports such schemes. 
> Nobody wants to ask the next question: How would the software (i.e. 
> Prometheus) decrypt the stored password? The answer is: With a key which 
> has to be placed right next to the config file with the encrypted values.
>
> In other words, in most cases there is zero gain in security while still 
> having to deal with an increase of complexity.
>
> The proper way to deal with this is ensuring that only the desired 
> technical users and persons have read permissions for your config files.
>
> This applies to passwords, tokens and private keys all in the same way.
>
> If your IT department has a solution to this fundamental "issue", then I 
> guess everyone will be eager to learn about it. :)
>
> Kind regards,
> Christian
>

-- 
You received this message because you are subscribed to the Google Groups 
"Prometheus Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/prometheus-users/6121395f-37be-40e4-a57d-641cd68dc5fbn%40googlegroups.com.

Reply via email to