this post was submitted on 14 Dec 2023
36 points (100.0% liked)

Selfhosted

39435 readers
4 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

Hi everyone, I was perusing through Conjur and Vault documentation, since I'm starting to think that learning a secret-management system might be a worthwhile investment with the app secrets and SSH keys and CA certificates around.

I was wondering, what do you use in your network? I plan to take a look at Teleport's documentation too, was curious about what the community uses at home.

Thanks!

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 1 points 11 months ago (1 children)

Pass works decently for us (fine except for the GPG key management aspect really) and allows us to have our Puppet config management write new secrets easily and read secrets for config file generation and similar purporses.

[–] [email protected] 1 points 10 months ago (1 children)

How do you securely authenticate, restrict access to secrets and store secrets with pass? Other than GPG authentication and discrete keys for different secrets (in which case, how would you automate key policies and life cycles?)

[–] [email protected] 2 points 10 months ago

We do use GPG keys that are essentially signed by one of our admin keys which is set to fully trusted on the client machines so that keys it signs are trusted with just the one signature. The keys themselves are generated with revocation certificates for those admin keys and a limited lifetime as well by our helper script. The signed keys are stored in the pass repository in a separate folder and the helper script has an idempotent import command which also checks a few other settings and common issues and generates missing revocation certificates after an admin key is replaced. Any automated changes in the repository itself (such as updating the .gpgid files in project directories to include all project members and reencryption afterwards) are made by our puppet master.

It certainly isn't perfect but it works well enough.