Show HN: EnvKey 2.0 – End-To-End Encrypted Environments (now open source)

This page summarizes the projects mentioned and recommended in the original post on news.ycombinator.com

Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
  • envkey

    Simple, end-to-end encrypted configuration and secrets management

    The process management code lives here: https://github.com/envkey/envkey/blob/main/public/sdks/envke...

    Basically the command you pass in to envkey-source is run via:

    exec.Command("sh", "-c", c)

    (c is the command you passed as a string.)

    Stdout/stderr is piped through, and .Wait() is called on the command. If envkey-source is in watch mode, it will send a SIGTERM when the environment is updated, then re-run the process once the initial process has died. I can verify that, for example, if a server listening on ports is restarted in this way, the process will die and the ports will be cleared before the new process is started (this has been well-tested).

    Do you see a problem with this approach? We will prioritize making all this bulletproof.

  • vault-exfiltrate

    proof-of-concept for recovering the master key from a Hashicorp Vault process

    Vault attempts to protect against host compromise scenarios, but it's a very hard problem. Ultimately, in order to do anything useful, Vault deals with plaintext values in memory, and that means that yes, there are ways for an attacker to get access.

    Here's a good example: https://github.com/slingamn/vault-exfiltrate

    The Vault docs include a list of 'hardening' steps for secure production usage. These are great steps to take, but each one represents a mistake that could be made. And because the Vault process is trusted with plaintext secrets, the stakes are high. Making a mistake could lead to a compromise.

    With EnvKey, the host server is never sent secrets in plaintext. For defense in depth, we also follow best practices for hardening our networks. But I think we've seen with Okta and other incidents that despite best intentions, best efforts, and strong engineering, trusting the host server whatsoever just isn't good enough anymore.

  • InfluxDB

    Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.

  • dumb-init

    A minimal init system for Linux containers

  • tini

    A tiny but valid `init` for containers

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts