-
-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
tmpfs for key generation #145
Comments
If the keys move to the client side to fix #75, you might want this for OS X
|
Well, that only works for single user instances. If you continue to need it on a daily basis and have a bunch of users, you just keep the one you brought up in the first place. Spinning up new instances and re-sharing the config files makes it inconvenient. |
Since we're moving keys to the client side, this should become a config option. The default behavior will be to generate keys in a tmpfs on the client and throw them away when done. If the user says they need the keys for later, then we will copy the keys out of the tmpfs before destroying it. |
In my mind Algo is not really designed to persist. When you spin it up when you need it and tear it down when you are done. When you need it again you spin up a new instance, with new keys.
If everyone agrees that statement aligns with the goals of Algo I propose we use tmpfs as a memory resident only storage of sensitive keys as a layer of protection against postmortem forensics analysis that could be used for key recovery if the image were ever recovered. While this may be an unlikely event, the level of effort to implement is minimal.
The text was updated successfully, but these errors were encountered: