-
Notifications
You must be signed in to change notification settings - Fork 88
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
improve documentation on password encryption for strong encryption #71
Comments
also see ulisesbocchio/jasypt-spring-boot#124 |
This is only related to the documentation. Fixes need to be applied here: |
It is a pitty: We had this story almost done with PR #298 but as the author of the PR left without reworking the last review feedback and nobody took over, I have to move this issue to the next release :( |
What still confuses me is why PR #332 documented the algorithm
BTW: Should that algorithm better go to |
I am quite confused that we have both. Having both next to each other ´application.yml Has encryption and running the application been tested with PBEWITHHMACSHA512ANDAES_256? just asking as I had some issues in the past to get it running. |
@maybeec You are IMHO missing the point: The master-password has to be configured somewhere per environment. To keep this separate from other configs (e.g. managed in git repos) containing encrypted passwords helps to keep the approach meaningful. If the masterpassword is contained in the same config file that also contains the enctypted passwords, we can also drop the encryption and leave the passwords in plain text. The benefit is that if a config file with encrypted passwords for whatever reason goes into the wrong hands (e.g. due to a human mistake it is send in an email or whatever) an attacker still can not get the unencrypted password. Therefore we introduced
That is exactly what I instructed @sujith-mn to do and what he has tested and documented. |
OK, fine for me. Anyhow I would even leave it out and not enable encryption by default. Even here we could have also thought about simply providing a tutorial and a minimal sample to show how to do it. In a could environment you would most probably provide the file as a config map or even as an environment variable. |
We never had jasypt encryption enforced and I do not even see how this could be archieved. It was always optional and will remain such. After all it is just a documentation feature. The only thing I was suggesting, is to pre-configure the algorithm to a secure one by default in our app-template to avoid that projects start with the jasypt default algorithm which seems to be insecure as you claimed when opening this issue. |
To make it cristal clear: There is one remaining question to clarify before we can close this story and we are already overdue with the release:
So our documentation is IMHO inconsistent. |
OK, with this algorithm there was more or less a missunderstanding on my end:
Sorry, that I did not get it initially. However, I have discussed with @sujith-mn and we took this missunderstanding as an indicator to further improve the doucmentation. So @sujith-mn will create another PR updating the doc to make this even more obvious and avoid such potential confusion. |
I made use of jasypt password encryption in my property files.
One of my first step was to choose a strong cipher algorithm, so I was taking
PBEWITHHMACSHA512ANDAES_256
as this was the best provided by jasypt at this moment of time. Interestingly, running the application, you get login issues as of non-provided password.During debugging I found out, that the password is decrypted to empty string for some reason. I haven't found the cause yet.
Anyhow, googling further, it seems, that jasypt is very instable in regards to AES encryption:
https://sourceforge.net/p/jasypt/bugs/32/
Are there alternatives right now? Do we wait until jasypt is released in a proper version?
The text was updated successfully, but these errors were encountered: