Hi Nadav,

You're wrong. Please educate yourself about what a security boundary is.

Kind regards,

Nick

On Tue, Oct 6, 2015 at 12:06 PM, Nadav Hod <nadav....@comm-it.co.il> wrote:
> Hi,
>
> The password doesn't need to be in plaintext in the configuration, it can 
> simply use an alias system so that if I send the argument "router123" then 
> router123's password will be copied to memory securely, where it can then be 
> used. Same goes for any passphrases for accessing certificate stores. This is 
> how kpcli works, you supply string1 and  you get back password1.
>
> I think there is merit in changing the existing configuration files from 
> using "router123,mypassword" to something like GetPassword(%UserName). It 
> seems more secure to me and not because of obfuscation but because the 
> interface with Radiator itself is more secure. It also doesn't expose 
> credentials nearly as much as the status quo. At no point in any of the 
> configuration files and databases should credentials be left in unguarded 
> cleartext, it's just not technical limitation these days.
>
> I'm unsure why there isn't any interest from anyone in this mailing list 
> other than myself to secure these credentials. Let's look at other solutions. 
> I heard a suggestion to use TPM, but that's hardware-specific and also 
> depends on how the encryption software supports its use.
>
> Would using Microsoft EFS on the Radiator folder (which contains all NAS 
> credentials) and limiting access be a stronger solution than using an 
> encrypted database? Would this cause a noticeable performance hit for an SMB?
>
> ________________________________________
> From: Christian Kratzer [ck-li...@cksoft.de]
> Sent: Saturday, October 03, 2015 4:06 PM
> To: Nadav Hod
> Cc: Tuure Vartiainen; radiator@open.com.au
> Subject: Re: [RADIATOR] Password/certificate security seems next to none      
>   on Radiator server
>
> Hi,
>
> On Fri, 2 Oct 2015, Nadav Hod wrote:
>> Hi Tuure,
>>
>> Moving the secrets from one cleartext file to another isn't secure, it's 
>> just a way to break the code between more files.
>
> you still clearly do not understand that there is no way to solve this in 
> software.
>
> Not in radiator or in any other software.
>
> Radiator or any other radius server needs to keep in plaintext:
> - credentials it needs to connect to backend databases
> - possible certificate private keys or passphrases to unlock those when needed
> - radius secrets
> - ...
>
>> I'm interested in a secure way to access credentials which are kept both 
>> encrypted and only accessed when authenticated by a keyfile or something 
>> equally strong.
>
> If credentials are kept encrypted and are decrypted on demand that is equally 
> just obfuscation.
>
> You asked for it and were shown a way how to accomplish this but rejected it.
>
>> As far as I can tell this doesn't exist today in Radiator, I'm asking this 
>> members in this mailing list whether or not they think there is added value 
>> in implementing some form of sustainable security for these credentials.
>
> Radiator is following best practices already.
>
> Greetings
> Christian
>
>
>
> --
> Christian Kratzer                   CK Software GmbH
> Email:   c...@cksoft.de               Wildberger Weg 24/2
> Phone:   +49 7032 893 997 - 0       D-71126 Gaeufelden
> Fax:     +49 7032 893 997 - 9       HRB 245288, Amtsgericht Stuttgart
> Mobile:  +49 171 1947 843           Geschaeftsfuehrer: Christian Kratzer
> Web:     http://www.cksoft.de/
> _______________________________________________
> radiator mailing list
> radiator@open.com.au
> http://www.open.com.au/mailman/listinfo/radiator
_______________________________________________
radiator mailing list
radiator@open.com.au
http://www.open.com.au/mailman/listinfo/radiator

Reply via email to