Database security
-
I haven’t added anything in working-1.6 but I have added a few comments for review if you’d be so kind and when you have enough time.
Thank you,
-
@Tom-Elliott Great comments, Tom! Thanks! Just pushed new commits and answered as well.
-
@george1421 @Tom-Elliott Further tested and improved
db-security
branch. Also testing upgrades from 1.4.4 and 1.5.7 now. Could you think of more tests we should do? Maybe in a storage node setup? So far I have not touched thefogstorage
DB user password. So it shouldn’t cause any trouble with storage node setups but you never know.EDIT: Now that I think more about it… the fogstorage DB user password is generated as
fs[0-9]*
and therefore fairly easy to brute force.Current diff: https://github.com/FOGProject/fogproject/compare/dev-branch...db-security
-
@Sebastian-Roth said in Database security:
EDIT: Now that I think more about it… the fogstorage DB user password is generated as fs[0-9]* and therefore fairly easy to brute force.
Could you run the generated password through md5sum or sha1sum to create a hash value. That hash value would then become the password. It would do a good job of scrambling of the password and make it over 15 characters (guess) long.
-
@george1421 md5 would at least be 32 characters but would do a good amount of scrambling. I don’t remember sha1-128-256-512 lengths off top of my head but pretty sure they have specific character lengths as well
-
@george1421 I’d like to keep at least one special character in the password. Just pushed a new implementation a few minutes ago: https://github.com/FOGProject/fogproject/blob/4caa9f0e2f98a95c95057aaac9021f13ca2d9128/lib/common/functions.sh#L2471
This will generate passwords of adjustable length with at least but no more than one special character.
-
[[ $length -ge 8 && $length -le 128 ]] || length=16
For password length NIST recommends at least 12 characters min for normal users and 20 characters min for Admin accounts (yes this is my life). I know FOG is not going towards any certification, but using a standard min recommendation is always a good start. FOG admins should never need to key this password in so a longer one is a bit better. I’m wondering if its a good idea to store this password in the .fogsettings file in some kind of reversible encrypted form?
-
@george1421 said:
For password length NIST recommends at least 12 characters min for normal users and 20 characters min for Admin accounts (yes this is my life).
I can see what you mean. I’ll make it 12 as minimum and 20 default.
I’m wondering if its a good idea to store this password in the .fogsettings file in some kind of reversible encrypted form?
For any kind of reversible encryption you need to have a secret. That needs to be stored somewhere. If a person is able to grab
/opt/fog/.fogsettings
the encryption key is also seen to be compromised. So I don’t see any better security with this.@Tom-Elliott I have done a fair amount of testing now and I have a good feeling about the changes not causing too much of trouble for users installing or upgrading FOG. You are welcome to look through the current change set again and comment. I plan to merge this into
dev-branch
tomorrow. -
@Sebastian-Roth while agree we need a more secure password for database and all, I don’t understand why we wouldn’t store the password with fogsettings. I say this because anybody who can get this file can just as easily get the config.class.php file which would have the password stored in plain text.
So removing it from this file doesn’t make it any more secure.
Similarly storing it in a reversible encrypted form wouldn’t matter either. Why waste time trying to encrypt or decrypt if it has to be stored in plain text on the system anyway? Just go to the file that has it stored.
Unfortunately there really isn’t a better way to access the database with a password than to have it called out in plain text to begin with.
Essentially it boils down to:
If the person can access /opt/fog/.fogsettings, they just as easily have access to the rest of the system and any files therein that may be accessible. It doesn’t matter how much we make the password secure, if they are on the system, you’re toast anyway.
Removing the password from .fogsettings just makes it harder for us and others to troubleshoot an issue with the database in general.
-
@Tom-Elliott said in Database security:
while agree we need a more secure password for database and all, I don’t understand why we wouldn’t store the password with fogsettings
I don’t intend to remove the stored password in .fogsettings. The password used to access the DB will be in .fogsettings and config.class.php in plain text. I don’t see any way around this.
-
Finally merged all the work into
dev-branch
. Done.