Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature enhancement] Rockstor config backup encryption with passphrase #1699

Closed
MFlyer opened this issue Apr 24, 2017 · 3 comments
Closed
Labels

Comments

@MFlyer
Copy link
Member

MFlyer commented Apr 24, 2017

While producing documentation for a Watchguard firewall config backup/restore procedure I realized we miss any kind of security over Rockstor config backups

Reason pushing me to add this feature: Rockstor backup file can have sensible data like AD Credentials/Rockstor credentials

Mirko

@daniel-illi
Copy link
Contributor

For me encryption of the backup files is not necessary as the files are created locally on the rockstor system. Only the root/admin user should have access to the backup files. If I want to download and archive a backup file, I can always encrypt the file myself.

So from my point of view this feature enhancement just increases the complexity of the backup functionality without real benefit.

An alternative to encryption could be an option to omit passwords and other sensible values from the backup file. On restore of a backup file a form could be presented to fill in the missing values.

But for me the functionality is good as it is, I would just add a notice/warning in the config backup documentation so the admin user is aware of the sensible data in a config backup file. Let the admin user decide himself how to best protect the data.

@Hooverdan96
Copy link
Member

Two opinions on both ends of the spectrum. @phillxnet, @FroggyFlox if we consider the documentation route, we could close this and add it as an issue over in the docs repo.

@phillxnet
Copy link
Member

@Hooverdan96 Thanks for attending to this issue, after so long. Much appreciated.

@FroggyFlox I've gone in @Hooverdan96 & @daniel-illi general direction re:

we could close this and add it as an issue over in the docs repo.

I'm not keen on encrypting the config back-up files myself: mainly on the grounds already indicated by @daniel-illi. If for example we implement an encryption mechanism using our new GNUPG root key, and folks have a system drive failure: we require them to have backed-up the auto created PGP key also. That's a tall order and any inclusion in download negates the added security anyway. Lets keep this simple as we have yet to 'attract' the size of development team required to support any more complexity that we already have. There there is always a loss to the use if things get too complicated.

I strongly prefer the doc route here, re sensitive configuration data contained in the associated files. We could further indicate the recent addition of our rpm enacted 'back-up' mechanism to further inform folks of where these files are copied during an rpm update.

Closing as
superseded by rockstor/rockstor-doc#465

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

4 participants