On Thu, Jun 10, 2021 at 07:29:56AM +0000, Phatkar, Swapnil (Contractor) wrote:
> We are using Solr 8.6.2 for our application. We have enable https for it . We 
> have to set following parameters for it .
> 
> SOLR_SSL_KEY_STORE
> SOLR_SSL_KEY_STORE_PASSWORD
> SOLR_SSL_TRUST_STORE
> SOLR_SSL_TRUST_STORE_PASSWORD
> 
> We need to set value for SOLR_SSL_KEY_STORE_PASSWORD and 
> SOLR_SSL_TRUST_STORE_PASSWORD as encrypted value .
> Please suggest how we can do it and how it will be read ( decrypted ) by Solr 
> ?

A lot of people think that they want to do this.  Unfortunately it
always leads to an infinite regression:  the only way for Solr to
decrypt an encrypted password would be to give Solr the decryption
key.  But the decryption key is itself sensitive information that
should be encrypted, requiring a decryption key for the decryption
key....

There are two ways out of this trap:

1:  do your best to keep unauthorized people away from the UNencrypted
    store passwords and accept the small risk that your best will some
    day not be good enough.  Usually it is not difficult to use
    ordinary filesystem protections to make these data "secure enough".

2:  write the startup process to require that a trusted operator enter
    the passwords at the console before Solr is started, so that they
    are never stored on the system in any form.

You haven't described your threat model, so I can't advise which is
best for you.  I can say that I have never yet found it necessary to
choose option 2.

-- 
Mark H. Wood
Lead Technology Analyst

University Library
Indiana University - Purdue University Indianapolis
755 W. Michigan Street
Indianapolis, IN 46202
317-274-0749
www.ulib.iupui.edu

Attachment: signature.asc
Description: PGP signature

Reply via email to