New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Protect keystorePassword in case https is used #164
Comments
I think this could be a good solution:
This is of course not perfect (the symmteric key is stored within the agent jar), but at least one can not open the keystore directly with this password (so it provides a somewhat intermediate level security). In implementing that, try to avoid external libs in order to keep the size footprint small. |
- Crypto related classes
Hi Roland, for this purpose i reuse (copy) approach and code from Apache Maven , JolokiaCipher.java. Cheers, |
Hi Neven, thanks for your work ! I had the change to have a look at your code. Looks good, have some comments, though:
I think that would give this feature a nice touch (but of course is not mandatory)
|
Hi Roland,
Cheers, |
Ok, I see. Let's do it like this: Simply continue as agreed, submit a PR and I will take care about how to best integrate it into the CLI. Ok ? |
OK. |
* Added documentation * Switched from an option '--encrypt' to a dedicated agent commad "encrypt" * Switched markers from "{ ... } " to "[[ .... ]]" for consistency with jmx4perl encryption markers * Simplified cypher which is sufficient for our needs (especially the salt generation)
Hi,
Currently keystore password is plain text in configuration file.
Maybe it should be:
Regards,
N.
The text was updated successfully, but these errors were encountered: