[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Omaha.pm] cisco vpn script
On Nov 8, 2004, at 11:35 PM, Terry wrote:
<<BRAINDUMP;
One could argue about storing your VPN password in a script
file....wonder if you could store it differently.....has to be passed
to vpnclient in the clear.....can't reverse a hash....mmm...
BRAINDUMP
#!/usr/bin/perl
use Expect;
$username = 'terry';
$password = 'password';
Ahh, Expect.pm. I have a soft spot for it. -sniff!- -grin-
Our passwords are in the clear in our source code too. I don't know how
to really get around that. Sure, you can obfuscate the heck out of it,
but you can't really make it unbreakable or you won't be able to use
it. -grin-
chmod your source unreadable by untrusted accounts, and I guess you're
as OK as you can be.
A vendor of ours forced us to start using a commercial version of PGP a
few years ago. It's a real pain to install, use, and fix (thank
goodness it is stable once running). You can't just run commands
command line and have the PGP engine do its thing, you have to have a
pgp daemon running and jump through a bunch of hoops to get anything
done. At the end of the day the data's on disk somewhere, unreadable by
untrusted users. Sure, it's obfuscated to the nth degree so even if you
were root it would probably be hard to break, but if you know what
you're doing I can't imagine it would be any harder than brute forcing
/etc/shadow...
So much security stuff strikes me as existing solely for its own sake.
Yes, I'm agitated by the entire registrar "certificate of authority"
universe too. -grin-
</rant>
j