【Vault KMS】How to initialized hashicorp vault safely

| 分类 安全工程师  | 标签 安全运营  数据安全  Vault 

I’m not going to introduce the basic concept of vault. and only focused on how to initialized it more secure. this is a step by step to help you to build a simple testing.

Requirements:

  • docker
  • gpg

Here is the steps:

0x01 Starting a Vault Server

  1. start the vault server
 docker run --rm --cap-add=IPC_LOCK -e 'VAULT_LOCAL_CONFIG={"backend": {"file": {"path": "/vault/file"}}, "default_lease_ttl": "168h", "max_lease_ttl": "720h", "listener": {"tcp":{ "address": "0.0.0.0:8201","tls_disable":"true"}}, "ui":"true"}' -e "VAULT_API_ADDR=http://0.0.0.0:8201" -p 8201:8201 vault server

notice:

  • If you didn’t enable the UI option, you will see the error 404 page not found
  • you can change the listening port, also you have to change the setting to export port from docker to host
  1. access the website https://127.0.0.1:8201, and you will see the initialization page. input the numbers of key share and key threshold image

0x02 Prepared GPG Public Key

  1. generate the pgp key with gpg --full-generate-key image

image

  1. you need make sure each Key Custodian has created their own PGP key, and share the public key to you. for example, if you setting 3 key shares in the first step. you have to got 3 PGP keys. also another one for root token.

0x03 Seal it

When a Vault server is started, it starts in a sealed state. In this state, Vault is configured to know where and how to access the physical storage, but doesn’t know how to decrypt any of it.

Unsealing is the process of obtaining the plaintext master key necessary to read the decryption key to decrypt the data, allowing access to the Vault.

  1. export PGP Public key and encode it with base64
gpg --list-keys
gpg --export 69D33CF252B5B177D67AC2728C8BF5945A111336 | base64

notice

  • gpg --export -a 'kso-01' > vault-admin.public was not

As you can see, i create 3 pgp keys for testing.

image

  1. enable text mode and put the 4 PGP public keys to the dashboard. which you got from the last step

image

  1. Download the keys and tokens which was encrypted by PGP Keys

image

Also you can click the button to show the cipher text. but you can’t get the real key without PGP private key.

image

Due to you need share those keys to each Key Custodian , so the better way is to download it.

image

0x004 Unseal it.

  1. Suppose all key custodian was get them keys. now you need to decrypt it and get the plaintext
echo xxxxxxxxxxxxx29a51e0dxxxxxxxxxxxxxxxxxxxxb48e7e5a83915a662989xxxxxxxxxxxxxxxxxxxx4077153525b0547841d52aab4dfab26f2e265f417f5e11c3a00 | xxd -r -p | gpg -d

image

and put those key into dashboard

image

image

0x004 Login into Vault

  1. decrypt the token and login into
echo xxxxxxxxxx+xxxxxxxxxxxxxxxxxxxx++xxxxxxx | base64 -d | gpg -d

Notice

  • Note that the decryption operations on both sides are different. you need to use xxd -r -p | gpg -d to decrypt key shares and use base64 -d | gpg -d to decrypt root token.

image

image

image

  1. seal again

image

0x005 Conclusion

this is a simple tutorial to help you to build a vault server with docker, and make sure it was shared to each person safety. There are many details when you deploy it into production.

For example:

  1. use different backend
  2. configure with certificate for TLS and so on.

Also there was many features with enterprise version.
For example:

  1. integrated vault with HSM.
  2. HA model & DR model.

You can find more details here: https://www.hashicorp.com/products/vault/pricing


上一篇     下一篇