On Thu, Jan 19, 2023 at 07:33:04PM +0100, a.grub...@bluewin.ch wrote:
> I asked Thomas as well, if he knows if this could be solved with placing the 
> path to the file - in my opinion, this is a easy, safe possiblitiy to 
> allocate any certs. That would be very helpful to have such tomcat.

I think there has been something missing in this discussion.  Several
people have advised removing the password from the credentials file.
This is not just giving up and trading security for practicality.
Storing a cleartext password on the same system with the
password-protected object is equivalent to having no password, because
anyone who can get the protected object can get the password from the
same place.

The only way that encrypting the container can increase security is to
provide the password from outside the system whenever it is needed --
e.g. have an operator type it in.  The purpose of encrypting the
container seems to be to protect it *in transit from one system to
another*, after which a human will decrypt it for use.

So:  it is unlikely that anyone will do more work on the code for no
more benefit.

When I think about it, this is just another layer of the reason that
these credentials containers *can* be encrypted:  such a file contains
all of the materials which are needed to evade security, so there must
be an external source of control to protect the contents:  something
which is not part of the materials and can be kept separate from them,
carried by different means.

-- 
Mark H. Wood
Lead Technology Analyst

University Library
Indiana University - Purdue University Indianapolis
755 W. Michigan Street
Indianapolis, IN 46202
317-274-0749
www.ulib.iupui.edu

Attachment: signature.asc
Description: PGP signature

Reply via email to