Bug 445205

Summary: [RFE] Encrypt replica information
Product: [Retired] freeIPA Reporter: Simo Sorce <ssorce>
Component: ipa-serverAssignee: Rob Crittenden <rcritten>
Status: CLOSED ERRATA QA Contact: Chandrasekar Kannan <ckannan>
Severity: low Docs Contact:
Priority: low    
Version: 1.0CC: benl, jgalipea
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: freeipa-2.0.0-1.fc15 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2012-03-27 07:12:58 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 453489    

Description Simo Sorce 2008-05-05 14:14:12 UTC
When we create a replica file we include in it very security sensitive
information. Then we tell the admin to move it to another machine and
use it.
This info is not cleared from the main server, and it may be forgotten
in a tmp directory on the target server.

Given we need to ask for the Directory Manager password to be able to
install the replica I was thinking it could be a good idea to encrypt
the replica information with the same password and decipher the data
only at installation time, making sure we clean up any temporary file.

This also implicitly proves the Directory Manager password is correct
even before trying to connect to the other server catching an error in
that sense very early on.

Comment 1 Rob Crittenden 2008-08-15 17:44:00 UTC
Committed by Simo.

master: 0368d4329ae54d97b6fb5da60580beefa29d07bc

Uses gpg to encrypt and decrypt the file using the DM password.

Comment 2 Jenny Severance 2008-12-01 18:55:38 UTC
Fix Verified:

Prompted for DM password when creating replica file.  
It is created in /var/lib/ipa and is encrypted.