> From: tech-boun...@lists.lopsa.org [mailto:tech-boun...@lists.lopsa.org]
> On Behalf Of Yves Dorfsman
> 
> Apps need to access database and other object stores, get access to other
> servers via keys, use encrypted ssl certs  etc...
> 
> The two strategies to deal with that I usually see are
> 
>   - variations on a config file (text) and trusting the OS permissions
> 
>   - manually entering a master password to an encrypted text file at start 
> time
> 
> 
> The former is simple and doesn't need human intervention but creates a
> security issue if the host gets compromised, the latter limits automation.
> 
> What other strategies have you seen successfully implemented?

Sometimes agents, such as ssh agent and pageant are used.

Sometimes credentials are application specific - for example, my google account 
uses "app passwords" so there is a randomly generated password assigned to my 
phone that I entered once into my phone, and another randomly generated 
password I entered once into my tablet, and another for my python mail sender, 
etc etc. 

But there's no escaping it:  You have precisely three options.  Either you (a) 
store some form of credentials on disk in a format that an attacker could read 
if they can access your filesystem, or (b) you require manual interaction at 
startup, or (c) you use the TPM to store a secret and only release it if 
certain system metrics are met.
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to