On 2013-11-07 12:05,
robert...@gmail.com wrote:
> Hi Brandon,
>
> thanks for your detailed response. I may have failed to mention that
> I'm not looking for a fully automated solution, only to NOT have to
> store passwords unencrypted on the file system, which as you know is a
> pretty basic security practice. To follow your analogy, I'm happy to
> carry a key and present it, I just don't want it duct-taped to my
> doorstep in plain view :).
I'd prefer an automation solution which lets me do what I need to. So,
as long as I have the flexibility to do what I need, and get help along
the way.. I'm happy.
In this case, you have all the flexibility you need (see below).
> It would be really cool if there was a builtin option within Salt to
> encrypt certain Pillar data (maybe with the master's key), and have it
> decrypted in flight to the minion. That would solve the problem of not
> storing passwords in cleartext.
While salt does not do this for you, you have everything you need to do
it rather simply.
For example, you could.. setup postgres to encrypt what you care about,
create a module to encrypt/decrypt and use postgres for storage, then
pull in this data as an external pillar.
You could do this differently such that it isn't in pillar, and run the
module on the minion itself (as opposed to on the master, where pillar
is collected).
> For now I have configured Rundeck (opensource command execution
> system minus Salt's config management) to execute the salt commands on
> the Salt master and pass the appropriate passwords as options. Rundeck
> has a secure password option that obscures the password when
> configured in a job, though not entirely sure yet where/how the
> passwords are actually stored. In this way the passwords aren't
> visible and the only thing I need to make sure of is that no one turns
Security by obscurity isn't security.
As you've noted, you're not 100% sure what is actually happening behind
the scenes. So, as I see it, your ignorance here appears ok because
rundeck at least hides the sensitive detail you care about from the
frontdoor.. but anyone who is determined to get into your network and to
your data will definitely poke around more than just the frontdoor, so
that ignorance _may_ bite you later on. Not attacking rundeck, just
noting the lack of strength in this reasoning.