TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Hashicorp Vault v1.0

409 pointsby blopeurover 6 years ago

11 comments

xhrpostover 6 years ago
Looking at some of these encryption-as-a-service providers, I'm a bit confused on one of the selling points. From my limited understanding: with a traditional system, you encrypt in the database but your encryption key likely exists on your main server, possibly in an environment variable. Attacker compromises main system and has access to both encrypted data and encryption keys. So, you instead use something like Vault to request an encryption key in real-time from a remote service and thus don't need to store it on your server. So, one of their selling points on their site is that Vault is better because two systems would have to be compromised by an attacker in order to decrypt sensitive data. The part I don't understand though is, if an attacker has compromised my server, could they not just initiate a request to Vault for a decryption key at that point? I feel like I'm missing something because this sounds like it remains a single point of failure.
评论 #18603238 未加载
评论 #18604019 未加载
评论 #18603211 未加载
评论 #18603130 未加载
评论 #18603463 未加载
评论 #18604021 未加载
评论 #18603786 未加载
评论 #18603656 未加载
评论 #18603478 未加载
评论 #18614715 未加载
评论 #18605023 未加载
评论 #18604042 未加载
_zskdover 6 years ago
Vault looks great, but I always balk at the operational overhead. Also the cost is significant. I&#x27;m at a tiny org, though.<p>For smaller orgs and projects, Mozilla Sops is really great:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;mozilla&#x2F;sops" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;mozilla&#x2F;sops</a><p>It encrypts your secrets at rest using Google KMS, Amazon KMS, and various other cloud provider key services. You can then put those secrets into your code repository, cloud file storage, etc. and give your build pipeline a service account with the ability to decrypt the secret files.<p>Scales like crap, but is quick and dirty when you need it.
评论 #18603147 未加载
评论 #18602709 未加载
评论 #18603320 未加载
评论 #18602746 未加载
评论 #18603038 未加载
评论 #18602887 未加载
评论 #18603400 未加载
kitotikover 6 years ago
Congrats on the big milestone.<p>I’ve been extremely happy working with HashiCorp tools for the past several years.<p>Vault provides sooooo much out of the box, it’s hard for me to imagine spinning up a new project without it anymore. Which leads to my biggest fear...my jaded-self is expecting an ‘unfriendly’ acquisition (Microsoft, Alphabet) and&#x2F;or some onerous licensing&#x2F;pricing changes.
评论 #18602557 未加载
评论 #18612922 未加载
评论 #18602788 未加载
评论 #18603321 未加载
aerovistaeover 6 years ago
My understanding of vault is not ironclad, but from what I have read it seems it allows ephemeral passwords that allow your application to get access to a service at time of initialization, and then the password ceases to be valid. Which means your application has access, but there&#x27;s no credentials floating around anywhere that they could be compromised later.<p>If anyone could correct me if I&#x27;m wrong, that would be great.
评论 #18602796 未加载
评论 #18602962 未加载
stevecaliforniaover 6 years ago
Went to use Vault for Enterprise and heard we got an invoice for half a million dollars. Went with another solution.
评论 #18602685 未加载
评论 #18602335 未加载
评论 #18602533 未加载
评论 #18603002 未加载
KerrickStaleyover 6 years ago
Confidant is another open-source product in this space <a href="https:&#x2F;&#x2F;lyft.github.io&#x2F;confidant&#x2F;" rel="nofollow">https:&#x2F;&#x2F;lyft.github.io&#x2F;confidant&#x2F;</a><p>Disclosure: I work at Lyft.
评论 #18602286 未加载
jteppinetteover 6 years ago
I spent a few months of side work time working on a &quot;secure-deployment-seed&quot; project, <a href="https:&#x2F;&#x2F;github.com&#x2F;jteppinette&#x2F;secure-deployment-seed" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;jteppinette&#x2F;secure-deployment-seed</a>. It is a set of Ansible playbooks&#x2F;roles that have Vault&#x2F;Consul at the center of a standard web deployment where privacy&#x2F;security is taken to the Nth degree of perfectionist driven insanity.<p>I ended up never using it, because it never really felt &quot;perfect&quot; to me.. There are so many circular dependencies between systems (DNS&#x2F;Consul-Template&#x2F;Consul&#x2F;Vault&#x2F;Ansible) and bootstrapping is just complete hell. Dive into that repo and witness it for yourself.<p>I can see myself using this setup if I was ever just doing Ops work, but when you are also doing everything else, it is just too much.<p>Anyways, congrats to the Hashicorp team. Your stuff really is topnotch.
babyover 6 years ago
There&#x27;s so much detailed craft and love poured into Hashicorp&#x27;s codebases, this is great. Congrats Mitchell!
SureshGover 6 years ago
We use <a href="https:&#x2F;&#x2F;square.github.io&#x2F;keywhiz&#x2F;" rel="nofollow">https:&#x2F;&#x2F;square.github.io&#x2F;keywhiz&#x2F;</a>. It provide secrets as files in a directory, securely. So no special API, client libraries required to access it.
评论 #18603131 未加载
Dowwieover 6 years ago
What are the real-world ephemeral workloads that batch tokens are intended to address?
评论 #18603008 未加载
chiuover 6 years ago
&quot;Expanded Alibaba Cloud Integration&quot; haha.