Closed Redfisky closed 4 years ago
@Redfisky Please see RFC 3768 (the updated VRRPv2 RFC) section 5.3.6:
Note: Earlier version of the VRRP specification had several defined
authentication types [RFC2338]. These were removed in this
specification because operational experience showed that they did not
provide any real security and would only cause multiple masters to be
created.
and also see RFC 5798 (the current VRRP RFC) section 9 and RFC 3768 (the updated VRRPv2 RFC) section 10:
VRRP for IPvX does not currently include any type of authentication.
Earlier versions of the VRRP (for IPv4) specification included
several types of authentication ranging from none to strong.
Operational experience and further analysis determined that these did
not provide sufficient security to overcome the vulnerability of
misconfigured secrets, causing multiple Masters to be elected.
...
We maintain authentication for backward compatibility with the original version of VRRPv2. However, since authentication is not supported in VRRPv3 and is no longer part of VRRPv2 and is not considered to provide sufficient security to be worth while, there does not appear to be any benefit in attempting to protect the password in the configuration.
@Redfisky Please see RFC 3768 (the updated VRRPv2 RFC) section 5.3.6:
Note: Earlier version of the VRRP specification had several defined authentication types [RFC2338]. These were removed in this specification because operational experience showed that they did not provide any real security and would only cause multiple masters to be created.
and also see RFC 5798 (the current VRRP RFC) section 9 and RFC 3768 (the updated VRRPv2 RFC) section 10:
VRRP for IPvX does not currently include any type of authentication. Earlier versions of the VRRP (for IPv4) specification included several types of authentication ranging from none to strong. Operational experience and further analysis determined that these did not provide sufficient security to overcome the vulnerability of misconfigured secrets, causing multiple Masters to be elected. ...
We maintain authentication for backward compatibility with the original version of VRRPv2. However, since authentication is not supported in VRRPv3 and is no longer part of VRRPv2 and is not considered to provide sufficient security to be worth while, there does not appear to be any benefit in attempting to protect the password in the configuration.
Thank you for reply.
Describe the issue In VRRP authentication configuration, for example:
auth_type PASS
auth_pass xxxxx(password)
, the password is stored in plaintext, any method to improve security or adding encryption mechanism?To Reproduce When configuring
keepalived.conf
VRRP parameters.Expected behavior Password is encrypted thus make it safer.
Keepalived version v2.0.19
Details of any containerisation or hosted service (e.g. AWS) Run on Kubernetes as a pod. (Huawei FusionStage EulerOS 2.0)
Configuration file: Sorry for the chinese annotations here.
auth_pass
needs encryption.