-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[feature request]: Add secure key storage and retrieval. #82
Comments
@jwdonahue any suggestion how to approch this? as you have suggested this feature. |
If there isn't an existing portable, secure key storage scheme, then we should design one. More research required. I think I stopped looking when the one thing I originally thought might work, turned out to be a Windows only kind of thing. Requirements:
I am not a trained security expert, so we should try to enlist one of those, if possible. I am fairly good at doing research, and this is an area I am interested in, but I am sure I can find as many ways to screw it up as get it right. There's probably lots of patent pitfalls in this area as well.
|
It's been years since I did a deep dive, but my recollection is that there are different levels of hardware support, for key storage and encryption schemes, across all the dotnet platforms. We should survey what is out there now, and if we can't find support for all five of those requirements, we should see if it would not be possible to come up with a reasonable interface/abstraction, and then start implementing for each target (if that's what is required). |
To be clear, either we do it the right way, or remove all private key storage and retrieval bits from the code base. We should NOT promote any kind of insecure private key storage or exchange mechanisms. The library may be useful enough by simply encapsulating some of the common encryption mechanisms. |
The question is like any other secret management, is it the libaray responsiblit to take care of secret? in real world I would not save secret as plan text, I would consider saving it in key vault. With that said, if you have idea come with it and we see how we could approch it. I was thinkin we are already having an AES encryption, we could use the libaray our encryption to encrypt own key. but buttom line some one need to remember the secret of encrypiton and decryption. |
@jwdonahue all issues is done expect this one, I was thinking we should make aware of that safing key need to be done in a secure storage like Key Vault or similar technology, Another way, I was thinking of using our AES encryption to encrypt the keys in storage, but that requires the user to have a unique secret to encrypt and decrypt the keys? what do you think? If we do not find a solutio, we could evently postpone it to 3.0.1 release. |
I have not had time to follow up on this. |
no worries, I am finding a posible solution :) |
Contact Details
No response
Is your feature request related to a problem? Please describe.
Add secure key storage and retrieval.
Describe the solution you'd like
Add secure key storage and retrieval.
Describe alternatives you've considered
No response
Additional context
No response
Priority Level
Medium
Code of Conduct
The text was updated successfully, but these errors were encountered: