-
Notifications
You must be signed in to change notification settings - Fork 25k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
elasticsearch-keystore requirement makes it needlesly obtuse to automate #64207
Comments
Pinging @elastic/es-security (:Security/Authentication) |
Pinging @elastic/es-core-infra (:Core/Infra/Settings) |
@XANi We appreciate the feedback. Software is hard, and appeasing every user and use case is a balancing act. We added the keystore intending to make storage of sensitive data more secure, protecting against other potential readers of the data on the same system. Configuration files like In regards to the troubles you have had with using the keystore within configuration management systems, we understand how frustrating slow processes can be. While editing the keystore is slower than editing a plaintext file, we have taken some recent steps to improve throughput, for example by allowing multiple keys to be set within the same Given the above, we don't have any plans at this time to change the keystore behavior, as it is working as intended. As such, I hope you don't mind that I close this issue. We value your feedback, so please continue to open enhancement requests if the issues you have had change or become worse. |
Before (using Puppet to automate):
adding:
changing:
all of that takes miliseconds for the Configuration Management software to do
After keystore
adding:
changing:
There is no added security with file that just lays there on the hard drive next to the config and defaults to no password, it's a security theatre. It's same terrible idea Java had for the cert keystore. Don't make it harder for people that can chmod a file on a hard drive. Also, keystore doesn't even create a file with proper permissions in the first place so just to set settings sudo is needed (and hey, it won't even tell you when you accidentally run it as root).
Or take inspiration from old unix daemons that loaded config to memory and then chrooted themselves away from the config dir so in case of security issue the process didn't even had permission to access its own config in the first place
The text was updated successfully, but these errors were encountered: