[ale] How do you store your passwords?
Charles Shapiro
hooterpincher at gmail.com
Mon Nov 12 09:48:29 EST 2007
Ooh,ooh,you should've been at the Atlanta BarCamp!
Saw a presentation there on OpenID ( http://openid.net/ ). It's real
interesting. The guy doin' the presentation was working on group ids as
well. I signed up ( http://myopenid.com ), although alas not too many sites
use it..
-- CHS
On 11/10/07, James P. Kinney III <jkinney at localnetsolutions.com> wrote:
>
> I haven't seen one in existence (doesn't mean it's not available) but a
> system that would store passwords and deliver them inline (i.e. input
> them at the prompt without the admin user ever seeing or knowing the
> password) would be quite useful.
>
> So instead of a direct ssh or su session, there is a wrapper that
> prompts for the admin users password (for sudo) that then decrypts the
> appropriate machine password and performs the login then return console
> back to the admin. Maybe something that gives back sudosh for audit
> purposes.
>
> On Sat, 2007-11-10 at 09:13 -0500, Jerry Yu wrote:
> > so far this is talking about keeping for personal use. What about for
> > group sharing? Are there a free/oss/commercial tools to have the
> > following features. GnuPG or PGP carries many of these features. Is
> > a good wrapper of GnuPG for this?
> > 1. condentiality: encryption (AES, 3DES, blowfish, crypt, etc.)
> > 2. authentication: indivual access key to the basically same file
> > 3. authorization: grant/revoke access w/o touching the secret
> > file(s)
> > 4. audit: audit trail of r/w or r/o access
> > 5. audit: version control
> > 6. availabilty: ease of publishing or distribution
> > 7. availability: DR (what if individual key/token get lost & what
> > about master key/phrase/secureID get lost)
> > 8. integrity: mechanism to verify authenticity & integrity of the
> > file
> >
> > On Nov 9, 2007 5:35 PM, Brian Pitts <brian at polibyte.com> wrote:
> > Nick Ali wrote:
> > > On Nov 9, 2007 4:46 PM, Paul Cartwright <
> > ale at pcartwright.com> wrote:
> > >> I can take that FILENAME.gpg, put it on my USB stick, and
> > carry it around
> > >> safely.. I think..
> > >
> > > You also need to carry the private key, which is stored in
> > ~/.gnupg if
> > > you just created a public/private key set on your local
> > machine. Just
> > > copy the .gnupg/ to your stick and use the --homedir option
> > to point
> > > to it when decrypting.
> > >
> > > nick
> >
> >
> > This is why I think an encrypted partition is a better
> > solution, btw. Of
> > course, you have to remember the password to decrypt the
> > master key that
> > decrypts the partition.
> >
> > http://www.saout.de/tikiwiki/tiki-index.php?page=LUKS
> >
> > -Brian
> >
> > _______________________________________________
> > Ale mailing list
> > Ale at ale.org
> > http://www.ale.org/mailman/listinfo/ale
> >
> >
> >
> > --
> > This message has been scanned for viruses and
> > dangerous content by MailScanner, and is
> > believed to be clean.
> > _______________________________________________
> > Ale mailing list
> > Ale at ale.org
> > http://www.ale.org/mailman/listinfo/ale
> --
> James P. Kinney III
> CEO & Director of Engineering
> Local Net Solutions,LLC
> 770-493-8244
> http://www.localnetsolutions.com
>
> GPG ID: 829C6CA7 James P. Kinney III (M.S. Physics)
> <jkinney at localnetsolutions.com>
> Fingerprint = 3C9E 6366 54FC A3FE BA4D 0659 6190 ADC3 829C 6CA7
>
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://www.ale.org/mailman/listinfo/ale
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Ale
mailing list