summaryrefslogtreecommitdiffstats
path: root/zarb-ml/mageia-sysadm/2011-February/002782.html
diff options
context:
space:
mode:
Diffstat (limited to 'zarb-ml/mageia-sysadm/2011-February/002782.html')
-rw-r--r--zarb-ml/mageia-sysadm/2011-February/002782.html199
1 files changed, 199 insertions, 0 deletions
diff --git a/zarb-ml/mageia-sysadm/2011-February/002782.html b/zarb-ml/mageia-sysadm/2011-February/002782.html
new file mode 100644
index 000000000..3dc44954e
--- /dev/null
+++ b/zarb-ml/mageia-sysadm/2011-February/002782.html
@@ -0,0 +1,199 @@
+<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
+<HTML>
+ <HEAD>
+ <TITLE> [Mageia-sysadm] Saving and sharing passwords in mageia teams
+ </TITLE>
+ <LINK REL="Index" HREF="index.html" >
+ <LINK REL="made" HREF="mailto:mageia-sysadm%40mageia.org?Subject=Re%3A%20%5BMageia-sysadm%5D%20Saving%20and%20sharing%20passwords%20in%20mageia%20teams&In-Reply-To=%3C201102190051.24144.bgmilne%40staff.telkomsa.net%3E">
+ <META NAME="robots" CONTENT="index,nofollow">
+ <META http-equiv="Content-Type" content="text/html; charset=us-ascii">
+ <LINK REL="Previous" HREF="002781.html">
+ <LINK REL="Next" HREF="002783.html">
+ </HEAD>
+ <BODY BGCOLOR="#ffffff">
+ <H1>[Mageia-sysadm] Saving and sharing passwords in mageia teams</H1>
+ <B>Buchan Milne</B>
+ <A HREF="mailto:mageia-sysadm%40mageia.org?Subject=Re%3A%20%5BMageia-sysadm%5D%20Saving%20and%20sharing%20passwords%20in%20mageia%20teams&In-Reply-To=%3C201102190051.24144.bgmilne%40staff.telkomsa.net%3E"
+ TITLE="[Mageia-sysadm] Saving and sharing passwords in mageia teams">bgmilne at staff.telkomsa.net
+ </A><BR>
+ <I>Fri Feb 18 23:51:23 CET 2011</I>
+ <P><UL>
+ <LI>Previous message: <A HREF="002781.html">[Mageia-sysadm] Automated Reply Re: &quot; Saving and sharing passwords in mageia teams&quot;
+</A></li>
+ <LI>Next message: <A HREF="002783.html">[Mageia-sysadm] Automated Reply Re: &quot;Re: Saving and sharing passwords in mageia teams&quot;
+</A></li>
+ <LI> <B>Messages sorted by:</B>
+ <a href="date.html#2782">[ date ]</a>
+ <a href="thread.html#2782">[ thread ]</a>
+ <a href="subject.html#2782">[ subject ]</a>
+ <a href="author.html#2782">[ author ]</a>
+ </LI>
+ </UL>
+ <HR>
+<!--beginarticle-->
+<PRE>On Friday, 18 February 2011 23:45:02 nicolas vigier wrote:
+&gt;<i> Hello,
+</I>&gt;<i>
+</I>&gt;<i> We often need to register some accounts on various websites for the
+</I>&gt;<i> Mageia project (domain name registration, twitter, identica, etc ...).
+</I>&gt;<i> And we need to be able to share the account informations (login and
+</I>&gt;<i> password) with other people inside teams. So we need something like a
+</I>&gt;<i> password database, with permissions to restrict access to only some
+</I>&gt;<i> people or groups of people. We can store this database on Mageia servers,
+</I>&gt;<i> but I think it should be encrypted, so that root access on the server
+</I>&gt;<i> does not give access to the passwords.
+</I>
+This is not an uncommon requirement, in my work environment we need to be able
+to share the local root passwords (e.g. in case a system administrator needs
+to be able to restore something that prevents user logins from working).
+
+However, in work environments, access to privileged passwords may need to be
+auditable.
+
+&gt;<i> I have looked at existing tools, but didn't find one that would allow
+</I>&gt;<i> us to do this easily. So I'm thinking about writting some scripts to do
+</I>&gt;<i> it. It would work like this :
+</I>&gt;<i>
+</I>&gt;<i> - all users first need to upload their gnupg public key in ldap
+</I>
+I was already considering the requirement for GPG public keys in LDAP for
+'privileged user password recovery'. E.g., use the same process as
+unprivileged users, but encrypt the key sent to the user with their gpg public
+key (providing a second level of authentication - if we consider access to the
+mailbox one level).
+
+I believe there may also an LDAP-based keyserver, which could provide even
+more re-use.
+
+&gt;<i> - we have a command to create a password on the server, with a list
+</I>&gt;<i> of groups/users who can access this password :
+</I>&gt;<i> $ mgapassword create passwdname %group1 %group2 user1 user2 ...
+</I>
+Should we leverage existing (e.g. LDAP) groups?
+
+&gt;<i> - a command to save the value of a password :
+</I>&gt;<i> $ mgapassword set passwdname &lt; value
+</I>&gt;<i> or
+</I>&gt;<i> $ mgapassword edit passwdname
+</I>&gt;<i> - an other command to retrieve a password :
+</I>&gt;<i> $ mgapassword get passwdname
+</I>&gt;<i> - a command to list the passwords you can access :
+</I>&gt;<i> $ mgapassword list
+</I>&gt;<i>
+</I>&gt;<i> All commands connect to the server using ssh and the ldap account. When
+</I>&gt;<i> saving a password, the client ask to the server the list of gpg keys of
+</I>&gt;<i> all users who should have access to the password, then encrypt the
+</I>&gt;<i> password with all keys and send it encrypted to the server.
+</I>
+Where are the passwords stored?
+
+&gt;<i> The command to retrieve a password connect to the server, then the server
+</I>&gt;<i> sends the password encrypted for the key of the user, which is decrypted
+</I>&gt;<i> locally using the private gpg key of the user.
+</I>&gt;<i>
+</I>&gt;<i> When new users are added into a group, they cannot access passwords
+</I>&gt;<i> immediatly (as it is not encrypted for their keys), so someone needs to
+</I>&gt;<i> retrieve and save the passwords, to encrypt them for the new users.
+</I>
+This general approach was what I was considering for our work environment.
+
+&gt;<i> So, what do you think about this ? Or maybe someone knows existing tools
+</I>&gt;<i> that can do this ?
+</I>
+I have not seen any I liked.
+
+Our work environment has a basic inventory database (the primary use was to
+generate kickstart files), the web front end is in ... Catalyst (and possibly
+try and implement a more complete CMDB). My plan was to integrate the CatDap
+features into this (using CatalystX::Features maybe). Adding a shared password
+module that could be tied into CatDap and our work webapp would also be
+interesting to me.
+
+But, for now, a command-line tool would be adequate.
+
+I will look at the LDAP side (schema, ACLs, suoport for adding GPG public key
+from CatDap) over the weekend.
+
+Regards,
+Buchan
+</PRE>
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+<!--endarticle-->
+ <HR>
+ <P><UL>
+ <!--threads-->
+ <LI>Previous message: <A HREF="002781.html">[Mageia-sysadm] Automated Reply Re: &quot; Saving and sharing passwords in mageia teams&quot;
+</A></li>
+ <LI>Next message: <A HREF="002783.html">[Mageia-sysadm] Automated Reply Re: &quot;Re: Saving and sharing passwords in mageia teams&quot;
+</A></li>
+ <LI> <B>Messages sorted by:</B>
+ <a href="date.html#2782">[ date ]</a>
+ <a href="thread.html#2782">[ thread ]</a>
+ <a href="subject.html#2782">[ subject ]</a>
+ <a href="author.html#2782">[ author ]</a>
+ </LI>
+ </UL>
+
+<hr>
+<a href="https://www.mageia.org/mailman/listinfo/mageia-sysadm">More information about the Mageia-sysadm
+mailing list</a><br>
+</body></html>