TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Confidant: an open-source secret management service

245 pointsby woodrowover 9 years ago

14 comments

vangaleover 9 years ago
This is the first time I&#x27;ve seen a nicely documented requirements.txt and I like! <a href="https:&#x2F;&#x2F;github.com&#x2F;lyft&#x2F;confidant&#x2F;blob&#x2F;master&#x2F;requirements.txt" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;lyft&#x2F;confidant&#x2F;blob&#x2F;master&#x2F;requirements.t...</a>
评论 #10509336 未加载
评论 #10511097 未加载
评论 #10510686 未加载
评论 #10510354 未加载
jvehentover 9 years ago
An alternative approach, if you don&#x27;t want to be 100% tied to KMS, is <a href="https:&#x2F;&#x2F;github.com&#x2F;mozilla&#x2F;sops" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;mozilla&#x2F;sops</a> . It uses KMS, but also PGP, and potentially anything that comes up in the future.
评论 #10508792 未加载
luisrudgeover 9 years ago
That&#x27;s very nice. If you&#x27;re using Microsoft Azure though, you might as well use Azure Key Vault[0].<p>[0] <a href="https:&#x2F;&#x2F;azure.microsoft.com&#x2F;en-us&#x2F;services&#x2F;key-vault&#x2F;" rel="nofollow">https:&#x2F;&#x2F;azure.microsoft.com&#x2F;en-us&#x2F;services&#x2F;key-vault&#x2F;</a>
评论 #10508610 未加载
austinjpover 9 years ago
How does this compare to Vault? [1]<p>Looks like Confidant is tied to AWS whereas Vault can use various backends..?<p>[1] <a href="https:&#x2F;&#x2F;www.vaultproject.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.vaultproject.io&#x2F;</a>
评论 #10508991 未加载
评论 #10508881 未加载
nemothekidover 9 years ago
I&#x27;d love for someone to explain what you get from using a secret management service other than encrypted at rest blobs.<p>Ex. You store your AWS Master key in a config file, and you have Microservice A that reads that key from the file. Microservice A is compromised (or its VM is compromised). How does having a secret store help you here? Couldn&#x27;t the attacker just inspect the code of Microservice A and see that you are just reading from disk&#x2F;reading from Vault?<p>In short, what do services like this protect from me (other than accidentally checking in my code to a public repo?)
评论 #10512022 未加载
dcossonover 9 years ago
I have a genuine question, why not use S3 alone for secret management?<p>One selling point of Confidant is using IAM roles to bootstrap authentication to the secret store. You can also do that with S3, put each secret into an individual text file and give each IAM role permission to access the secrets it needs. Set the S3 bucket to encrypt the data at rest, it uses KMS behind the scenes and automatically rotates encryption keys.<p>Rotation of the secrets themselves could be scripted or manual, that part would be basically the same process as using Confidant or any other tool. And I believe S3 access can even be auditable with CloudWatch logs.<p>Also, S3 now offers either eventually consistent or read-after-write consistency. EDIT: actually, it looks like new object PUTS can be read-after-write consistent but updates are not. So this could be a downside, if you rotate a key getting the new one is eventually consistent. In practice this might not be a big deal though, there&#x27;s already going to be a gap between when you activate the new key and when your app gets reconfigured to start using the new key.<p>I&#x27;m very curious what the downsides might be of doing this. For all the various secret management tools that have been released in the past year or two, I&#x27;m kind of surprised I&#x27;ve never heard anyone talk about using raw S3.
评论 #10512110 未加载
评论 #10512133 未加载
basculeover 9 years ago
So they basically reinvented this?<p><a href="https:&#x2F;&#x2F;github.com&#x2F;codahale&#x2F;sneaker" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;codahale&#x2F;sneaker</a>
评论 #10509301 未加载
AndrewWrightover 9 years ago
Another alternative developed for AWS deployments, written in Python and uses KMS: Credstash <a href="https:&#x2F;&#x2F;github.com&#x2F;fugue&#x2F;credstash" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;fugue&#x2F;credstash</a>
评论 #10509383 未加载
Merkurover 9 years ago
Please correct me if I am wrong, but I think there is no secure way to store stuff in an virtual environment.<p>I wish I am wrong - cause my heart always bleeds if I see db passwords in configuration files! But As long as there is a hypervisor you do not control access to - you must trust the owner of the bare metal to (1) honor your privacy (2) be competent to secure his system. Trust is nice, but it is not security.<p>granted - Confidant and KMS seem better solution than most. Will look into it at more detail. thx for open sourcing it and moving the solution forward.
评论 #10510379 未加载
评论 #10510116 未加载
jonesb6over 9 years ago
Nice way for Lyft to fire back after that iOS reverse-engineering video [1] revealed that they were showing off one of their keys in a production client. I don&#x27;t know if this was intentional, and I believe whatever exploit they had was mild, but it restores (at first glance) my faith in them a bit :).<p>[1]: <a href="https:&#x2F;&#x2F;realm.io&#x2F;news&#x2F;conrad-kramer-reverse-engineering-ios-apps-lyft&#x2F;" rel="nofollow">https:&#x2F;&#x2F;realm.io&#x2F;news&#x2F;conrad-kramer-reverse-engineering-ios-...</a>
justadanover 9 years ago
&quot;KMS provides access to master encryption keys,... but doesn’t provide direct access to the master key itself, so it can’t be stolen.&quot;<p>Doesn&#x27;t Amazon KMS have access to the master key? And therefore, it can be stolen from them?
评论 #10508754 未加载
squidlogicover 9 years ago
We use ZeroTier to encrypt our AWS microservices traffic. Way easier to setup and just ... works.
评论 #10508762 未加载
bpicoloover 9 years ago
Another one of those problems every company seems to try to solve on their own. :P
评论 #10510733 未加载
normanjoynerover 9 years ago
It&#x27;s unfortunate that this is tied to AWS, while the industry is moving towards a cloud agnostic approach to hosting.<p>That being said, it seems like an interesting project to keep an eye on.
评论 #10509899 未加载
评论 #10509646 未加载