Yes but as I mentioned in the original post, I suggested to access these stores 
over a network share. These really shouldn't be local, afterall the 
certificates can be loaded into memory and passwords can also be loaded into 
memory. The share can be secured behind firewall (including different security 
modules) and domain-level security. Most SMB's and enterprises already have 
these in place. Keeping things local is bad practice for several reasons.

________________________________________
From: Nick Lowe [nick.l...@lugatech.com]
Sent: Friday, October 02, 2015 5:52 PM
To: Nadav Hod
Cc: Tuure Vartiainen; radiator@open.com.au
Subject: Re: [RADIATOR] Password/certificate security seems next to none on 
Radiator server

Nadav,

You're just obfuscating by doing this as the RADIUS server still have
to get access to those things. Security through obscurity really
doesn't exist. It is a complete waste of time in my opinion.

You have to reply on encryption of the backing storage and OS security
primitives with administrative best practice to do this properly.
There is no other way.

Once somebody owns a box, all bets are off.

Regards,

Nick
_______________________________________________
radiator mailing list
radiator@open.com.au
http://www.open.com.au/mailman/listinfo/radiator

Reply via email to