Closed fblz closed 5 months ago
Okay to take the post you linked:
ps -eww
- How should that expose env-vars? Okay if you put it into the CLI call it might (cannot reproduce as that's just plain stupid and nothing on my system uses that). When puttin them into through systemd / docker / k8s secrets they are not exposed./proc/<pid>/environ
as the same user (or root): You can read the file.So still, I don't see any argument against ENV vars and pro files which is effort to implement, a breaking change and does IMHO not improve security.
Moved from #177:
Using environment variables for configuration does not provide a secure way to manage Redis credentials. I propose implementing a configuration file to prevent credentials from being accessible through the environment.
From Luzifer in #177:
I think the following holds some good arguments on why environment variables are sub optimal for secret storage: https://security.stackexchange.com/questions/197784/is-it-unsafe-to-use-environmental-variables-for-secret-data
My concerns here are mainly with credentials ending up in crush dumps or similar. I would prefer to pass the credentials at runtime via dedicated secrets management, but this is a bigger change.