Hi, Andreas,

I second everything Benjamin says.

It’s not a good practice to store passwords in plain text, period.
Shiro.ini in particular gets checked into code repositories, and it’s not a 
good place for passwords to be.

Current “good practice” is something called “zero trust” and just because the 
system is behind ssh, it doesn’t mean
that a threat actor cannot hack into it some other way, and get the password.
Plain-text passwords just open up more security threats that you can possibly 
think of.

> On Sep 2, 2024, at 11:38 AM, Andreas Reichel <andr...@manticore-projects.com> 
> wrote:
> 
> On Mon, 2024-09-02 at 18:31 +0200, Benjamin Marwell wrote:
>> Hello Andreas!
>> 
>> Since current Linux and Unix distributions have environment variables
>> secured from other users nowadays, one way would be to inject them at
>> runtime via ${ENV_VARIABLE_NAME}.
>> 
>> A few examples are in our documentation:
>> https://shiro.apache.org/configuration.html 
>> <https://shiro.apache.org/configuration.html>
>> 
>> Let us know if that works for you.
> 
> You Sir are my hero!
> This works perfectly fine for the audit drones because it gets the ball back 
> into the client's court:
> 
> 1) if they don't want to hard code passwords of those technical user 
> accounts, then provide the System properties when starting the Web 
> Application (which will be so much fun)
> 2) otherwise accept that the password has to be somewhere and secure your 
> server properly against unauthorised access
> 
> Btw, those servers holding this shiro.ini files have SSH password only access 
> with accounts like "admin/admin" 😄
> What a time to be alive.
> 
> Thank you so much for prompt round turn and cheers!
> Andreas

Reply via email to