Skip to main content

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [List Home]
Re: [stellation-res] Command line configuration specification

----- Original Message -----
From: "Jim Wright - IBM Research" <jwright@xxxxxxxxxxxxxx>
To: <stellation-res@xxxxxxxxxxxxxxx>
Sent: Monday, January 13, 2003 4:08 PM
Subject: Re: [stellation-res] Command line configuration specification


> At 03:45 PM 1/13/2003, Mark C. Chu-Carroll wrote:
> >On Mon, 2003-01-13 at 15:23, Jonathan Gossage wrote:
> > > > On Mon, 2003-01-13 at 14:42, Jonathan Gossage wrote:
> > > > > > - I'm a bit skeptical about encrypting the database admin
password.
> > > The
> > > > > >   question is, how do we encrypt it? I can't think of a way that
> > won't
> > > > > >   be easy to reverse engineer and determine the password.
> <snip>
>
> I don't know if you want to go this route -- but Eclipse has what is
> claimed to be
> a "cryptographically secure keyring facility" -- see
> org.eclipse.core.runtime.Platform.addAuthorizationInfo and related methods
> in the same class.    Since this is in core, it could be used by an
> Eclipse-based
> Stellation CLI.   The main benefit would be that we don't have to roll our
own
> secure store.
>
> This facility maps the tuple <URL serverUrl, String realm, String
authScheme>
> to a Map<String,String>, typically containing info such as usernames and
> passwords.
>
> Of course, this doesn't address the issue of keeping the access tuple
> secure -- for
> servers to start automatically, the access tuple must be
> a) hard-coded,
> b) stored in a server-local plugin config file or the like (which can be a
bit
> tricky to find, since it's buried in the Eclipse .metadata tree, but that
> wouldn't stop anyone determined with root-level server access),
> OR
> c) acquired by the server in some mystical fashion (telephone?  metal
> telepathy?).

You might have better luck with organic telepathy!

>
> Sorry, I only know how to do a) or b) ....
>
> - Jim
>

Regards

Jonathan



Back to the top