I think Michael makes a very good point. We trust our admins with root access, so I can't imagine why we'd go extra mile hiding an app secrets from them when they are so powerful with root already. If I had a sysadmin that I couldn't trust handling this token properly, I would never hire him in the first place. As long as the secret accessibility is restricted to an appointed unix group (e.g. "deploy") - that should work, shouldn't it?
*From:* rubyonrails-core@googlegroups.com [mailto: rubyonrails-core@googlegroups.com] *On Behalf Of *Michael Koziarski *Sent:* Friday, March 28, 2014 4:47 PM *To:* rubyonrails-core@googlegroups.com *Subject:* Re: [Rails-core] Proposal: Dynamic secret_tokens If you wanted to attempt support for a dynamic secret, you could give it a go, but I feel I should correct one thing. Systems administrators will *always* be able to read your secret, there is *no* avoiding this, they can fire up rails console and run: irb(main):002:0> Rails.application.config.secret_key_base => "f1a4df910e88f985dd555dd4ad0210b4cc8e9ca8306ab8ae29164d4c8874b5yesthisisrandomnoisenotmysecret6ad01ac7762ede919f5f5c513bf866654d1355" Even if we tried to put in mitigations for this risk, there's always GDB. So if you want dynamic secrets for some reason, give it a go and see how the patch turns out, but don't do it to make your secret 'admin proof', that's not going to happen. On Sat, Mar 29, 2014 at 4:02 AM, Bert Goethals <bertgoeth...@gmail.com> wrote: Hi all, Security is always a hot topic, and in our company especially. We where looking into the secret tokens. And we think we can do a step better than an "secrets.yml" file. The fact is that system administrators still have access to the secret token, and that is not always acceptable. Replacing the secret token each time an admin leaves, is not a viable solution. So we fought, how about a dynamic token? Proposing to make the token "callable". Besides being a string, the token could be a proc or anything responding to call, receiving the request object. This allows the implementer to dynamically change the token. This can be useful to have a separate token per domain, very useful in multi tenant applications. If there is intrest in this, I'm willing to develop it as well! What do you think? -- You received this message because you are subscribed to the Google Groups "Ruby on Rails: Core" group. To unsubscribe from this group and stop receiving emails from it, send an email to rubyonrails-core+unsubscr...@googlegroups.com. To post to this group, send email to rubyonrails-core@googlegroups.com. Visit this group at http://groups.google.com/group/rubyonrails-core. For more options, visit https://groups.google.com/d/optout. -- Cheers Koz -- You received this message because you are subscribed to the Google Groups "Ruby on Rails: Core" group. To unsubscribe from this group and stop receiving emails from it, send an email to rubyonrails-core+unsubscr...@googlegroups.com. To post to this group, send email to rubyonrails-core@googlegroups.com. Visit this group at http://groups.google.com/group/rubyonrails-core. For more options, visit https://groups.google.com/d/optout. -- You received this message because you are subscribed to the Google Groups "Ruby on Rails: Core" group. To unsubscribe from this group and stop receiving emails from it, send an email to rubyonrails-core+unsubscr...@googlegroups.com. To post to this group, send email to rubyonrails-core@googlegroups.com. Visit this group at http://groups.google.com/group/rubyonrails-core. For more options, visit https://groups.google.com/d/optout.