Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
view the rest of the comments
I'm using pass at home, but I've used hashicorp vault at a few jobs with great success.
IBM just forked it to openBao as well to get around the business license, if that's a concern for your. But honestly I'd trust hashicorp more than IBM at this point.
Pass for personal use is great. Especially if paired with a self hosted private git repo like gitea.
Pass works well on all platforms I've tried, even android and wsl (although I've not tried with iPhone).
In a corporate setting. The biggest questions is going to be if there is already a secret store that has an API. If security will let you roll your own. How is it allowed to be networked. Who are the preferred vendors and is there any enterprise support available.
Pass works decently for us (fine except for the GPG key management aspect really) and allows us to have our Puppet config management write new secrets easily and read secrets for config file generation and similar purporses.
How do you securely authenticate, restrict access to secrets and store secrets with pass? Other than GPG authentication and discrete keys for different secrets (in which case, how would you automate key policies and life cycles?)
We do use GPG keys that are essentially signed by one of our admin keys which is set to fully trusted on the client machines so that keys it signs are trusted with just the one signature. The keys themselves are generated with revocation certificates for those admin keys and a limited lifetime as well by our helper script. The signed keys are stored in the pass repository in a separate folder and the helper script has an idempotent import command which also checks a few other settings and common issues and generates missing revocation certificates after an admin key is replaced. Any automated changes in the repository itself (such as updating the .gpgid files in project directories to include all project members and reencryption afterwards) are made by our puppet master.
It certainly isn't perfect but it works well enough.
Please excuse the absolute newbie question - What's "pass"?
@jmd_akbar @lungdart https://www.passwordstore.org/
Thanks :)
Indeed, I had heard of OpenBao recently. If it's a Vault replacement, I'm assuming good support with API and orchestration tools. I'll check it out, thanks.
How is pass treating you?
Does
pass
have an API I can use in Ansbile/Terraform/IaC tools?It's a cli tool, so you can call it within another call using dollar sign syntax
Thanks
Could you tell me how I can use pass whilst authenticating an application with something akin to identities? I.e. I need application 1 to be able to access a certain key but I don't want application 2 to be able to do so. How would I be able to restrict access to keys?
A bit about the scenario: I will be running this in a VM which will act as my central password suite on the network, which I will access using a password/keys.
Pass can't do this.
I might actually have to use Conjur for temporary credentials in my network. Thanks