RFC-18: Encryption of passwords in mapfiles
Daniel Morissette
dmorissette at MAPGEARS.COM
Tue May 30 11:55:48 EDT 2006
Stephen Woodbridge wrote:
>
> So just to be clear on my understanding of this, any one that can get
> TEA, read the mykey.txt file and write a trivial program can decrypt the
> password. If mykey.txt is in the mapfile then I'm mostly home free, if I
> can install a trivial php script that can read MS_ENCRYPTION_KEY then I
> can open the file and read the contents and I can also probably read the
> mapfile and read its contents and then decrypt it online or offline.
>
> The problem with this is that there is no real way to secure mykey.txt
> because it has to be readable by the webserver process so anyone that
> can add php script can access it.
>
> I can't think of a better way to do this, but I think it should be made
> VERY clear in the documentation that this is just simple obfuscation and
> is by NO means secure and that users should NOT place VALUABLE passwords
> in mapfiles encrypted or not.
>
You're correct, this only provides obfuscation as far as people with
access to the server are concerned, but obfuscation can be better than
plain text in some cases as long as admins are well aware that this is
not highly secure. We all had the same initial reaction as you on that
front, including myself, and I just added a note about this concern at
the end of the RFC.
Note that one of the real benefits of this is that it protects the
passwords in backups (as long as the key is not included in the backup),
when transferring the mapfile over insecure medias, and prevents plain
text passwords from showing up in error messages or log files (not sure
if any password was ever exposed this way though).
BTW, bug 1792 has been created for this RFC:
http://mapserver.gis.umn.edu/bugs/show_bug.cgi?id=1792
Daniel
--
Daniel Morissette
http://www.mapgears.com/
More information about the mapserver-dev
mailing list