this post was submitted on 18 Aug 2023
72 points (91.9% liked)

Linux

47232 readers
948 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

Almost every program that we run has access to the environment, so nothing stops them from curling our credentials to some nefarious server.

Why don't we put credentials in files and then pass them to the programs that need them? Maybe coupled with some mechanism that prevents executables from reading any random file except those approved.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 33 points 1 year ago (6 children)

I have a rule that credentials in environment variables are to only ever be loaded as needed via some sort of secrets manager, optionally adding a wrapper script to do so transparently.

The whole point of passing secrets as environment variables is to avoid having things in files in plain and in known locations easy to scrape up by any malware.

Now we have people going full circle and slapping those into a .env file.

[–] [email protected] 3 points 1 year ago (2 children)

But how do you authenticate to your secret manager? How do you prevent evil scripts from also doing this?

[–] [email protected] 2 points 1 year ago

I type my password, or on the work MacBook, TouchID. I'd imagine yubikeys would do too.

[–] [email protected] 1 points 1 year ago

You could decrypt a GPG key-based file to do that.

load more comments (3 replies)