Additionally, is there some special character format for passwords? I can have âYOUR_PASSWORDâ in my secrets.yaml, but not what with alphanumeric and special characters as it adds an error on config check.
Sorry for necroposting but I think the last question is very relevant but not totally addressed.
If âsecret.yaml is only as secure as access to your config folderâ, it seems to me that anyone who has access to configuration.yaml will also be able to access secret.yaml.
Since there is no mention of crypting secret.yaml, how is that any more secure than using a plain configuration.yaml?
It allows for sharing and backup of configuration files on github (the secret file is not uploaded). It is also convenient when sharing configurations on this forum as there is no need to obscure anything.
With different notifications in locations all over your configuration (and similar) it also allows the actual strings used to be kept only in one place.
So this is both tidy and convenient.
Your usage (using as Tomâs example : -
from above) makes it really obvious what it contains. Rather than having to see username: Gh467YYyttr
You see something that makes sense
If any of my services requires that I change my key/username (canât think why but it may happen) then I know where and just do it in one place
Using username: !secret ring_usr (as an example) is also a LOT shorter than some of my keys (duckdns, pushbullet, telegram, z_wave, metoffice etc. )
They are not hashed when stored in secrets but that allows you to manually edit them, copy them etc. In theory You could hash them when storing from (say) the front end but I think youâd lose more than youâd gain.
Remember, if someone has malicious intent with access to your config, you have a lot more to worry about than just a few passwords.
Dan, You wouldnât believe the number of times we have people post parts of their configuration because they have a problem with something. And include a portion with âcompromisingâ information.
Using âsecretsâ âshouldâ reduce this greatly
We also get people who redact internal IP addresses, so inherently their understanding of what should be private and what can be globally visible (without affecting security) is a bit skewed.