Friday, 2020-12-04

*** mnasiadka has quit IRC00:57
*** mnasiadka has joined #openstack-barbican00:58
*** tosky has quit IRC01:01
*** jmlowe has quit IRC03:36
*** jmlowe has joined #openstack-barbican03:39
*** tkajinam has quit IRC08:31
*** tkajinam has joined #openstack-barbican08:32
*** jaosorior has joined #openstack-barbican08:35
*** xek_ has joined #openstack-barbican08:58
*** tosky has joined #openstack-barbican09:05
*** jmlowe has quit IRC14:02
*** tkajinam has quit IRC14:07
*** jmlowe has joined #openstack-barbican14:24
*** jmlowe has quit IRC14:31
*** jmlowe has joined #openstack-barbican14:42
*** jmlowe has quit IRC14:42
*** jmlowe has joined #openstack-barbican14:43
*** jmlowe has quit IRC14:50
*** jmlowe has joined #openstack-barbican14:52
*** jmlowe has quit IRC14:54
*** jmlowe has joined #openstack-barbican15:17
*** jmlowe has quit IRC15:29
*** jmlowe has joined #openstack-barbican15:51
*** jmlowe has quit IRC16:01
*** ecsantos has joined #openstack-barbican16:01
ecsantoshi! i have some questions about barbican/castellan. can i ask someone here?16:09
*** jmlowe has joined #openstack-barbican16:17
redrobothi ecsantos!  You're in the right place.16:19
ecsantosredrobot: thank you! i'm contributing to openstack/manila. we support security services, i.e., ldap, kerberos and active directory (Microsoft). our passwords are currently available in plain text in the manila database; we don't want that. i came across barbican and castellan and thought they might be a viable option. my use case: encrypt secrets from users, so that even admins can't see the users' passwords in plain text. my concerns:16:27
ecsantosreading the castellan docs, it appears that anyone with root access can change the castellan.conf file and create/recover/delete secrets. is there a way to make this work?16:27
redrobotecsantos, so, the way that both Castelan and Barbican work is that they allow you to store all secrets, but you still need to have credentials to access the secret storage16:33
redrobotecsantos, we do not protect agains > root access to configuration that contains the credentials to access barbican and/or castellan <16:33
redrobotthere's all kinds of nefarious stuff that an attacker could do with root access to the system.16:34
redrobotThere's ways to add additionaly protection, but it is outside the scope of Castellan and/or Barbican16:35
redrobote.g. Manila could ask for the credentials at startup and have them in memory instead of on disk, but even then an attacker with root can still dump memory16:35
redrobotnot sure if that's helpful, ecsantos16:36
ecsantosthat was very helpful, redrobot, thank you. it makes sense, i think i'll deal with the root access issue separately.16:46
ecsantoswhere do castellan stores the secrets exactly?16:46
redrobotecsantos, castellan is basically just a shim between openstack services and _some_ secret manager.  Typically you would use Castellan->Barbican, but Castellan->Hashicorp Vault is also an option.16:57
*** jaosorior has quit IRC17:01
ecsantosoh i see. Barbican stores them in a SQLAlchemy DB, the same as the rest of the OpenStack services, right?17:15
JohnnyRainbowis there any nice article how to integrate vault with barbican/openstack? So far in openstack docs I haven't found too much details. Appreciate any help!17:47
*** jmlowe has quit IRC17:58
*** jmlowe has joined #openstack-barbican18:18
*** raildo has quit IRC18:21
*** jmlowe has quit IRC18:22
*** jmlowe has joined #openstack-barbican18:24
*** ecsantos has quit IRC18:33
*** raildo has joined #openstack-barbican18:43
*** raildo has quit IRC18:45
*** raildo has joined #openstack-barbican18:48
*** jmlowe has quit IRC18:52
*** jmlowe has joined #openstack-barbican19:06
*** jmlowe has quit IRC19:09
*** jmlowe has joined #openstack-barbican20:35
*** raildo has quit IRC21:59
*** tkajinam has joined #openstack-barbican22:00
*** xek_ has quit IRC23:02
*** tosky has quit IRC23:54

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!