I totally understand that. In fact, that is basically my argument for why I don't want Micha to encrypt the entire config as a binary. I tend to ride the fence on these sort of things though from a security perspective, which unfortunately is almost always at odds with matters of convenience. The thing to remember, is that if a config is portable for you, it's also portable for hackers. The reason being is that hashes with no salt are breakable by the same set of rainbow tables. Once you salt the hash, a different rainbow table would have to be generated for each Railo instance.
The min length for the Railo admin password is 6 characters. No problem, here's a rainbow table of every SHA-256 hash for up to 7 characters.
Now, the good thing is Micha uses 5 iterations of hashing which means a larger table has to be generated that runs each possible string through 7 iterations, plus Micha added his own flavor of base64 encoding between each digest which means that an off-the-shelf table probably can't be used. Trust me though, if Railo gets popular enough, there will be some bored hackers some mad GPUs laying around and they will make a table for Railo.
Enter salt: A table that goes up to a 7 character password is going to be able to crack a decent number of lazy admins who barely snuck by the min password requirements. (And it's about 41GB in size) Add a salt-- say 32 characters of UNIQUE data to each iteration, and boom you now would need more storage than what exists on planet Earth to generate that rainbow table plus a few million years of time. And when you get done, your rainbow table would only be useful for a single solitary Railo server. All because the password wasn't portable.
I know, it all kind of sucks. I'm fighting for things to be simple because I'm a lazy person, but security is always what makes me do a second take, and I certainly don't want Railo picking up the same reputation ACF is getting for security.