Avoid weak master key #538
Replies: 5 comments 38 replies
-
I personally like this idea
|
Beta Was this translation helpful? Give feedback.
-
So the idea is to follow a particular format or just to ensure a minimum hash size? |
Beta Was this translation helpful? Give feedback.
-
I would like to see this considered for v1.0 It means preventing users from using what we could consider a weak master key and guiding them most efficiently not to tarnish their experience, as @brunoocasali mentioned. If you have solution proposals, we can start discussing them here. For now, @brunoocasali proposed to expect a particular format + a minimum hash size. |
Beta Was this translation helpful? Give feedback.
-
Thanks, everyone; the proposed ideas seem to solve the weak master key issue. To clarify, here is where we are exploring this topic, it also raises some questions we want to consider. Enforcing a minimum number of chars for the master key instead of a specific format (e.g. uuid-v4, sha256, etc)A suggestion brought up by @dureuill during the engine weekly meeting; We don't necessarily want to wait for a specific format. Asking for a minimum number of characters could be sufficient to guide users to a more secure master key without requiring a format that can be difficult to generate. (@dureuill, please correct me if it's unclear or does not relate to your suggestion). WDYT? How many minimum characters should Meilisearch expect for the master key to be valid?IMO, if no particular format is requested other than the current one (The master key must be composed of valid utf-8 characters), 16 characters seem better. WDYT? Do we want to enforce this behavior regardless of the environment (development/production)?@irevoire pointed out that it can be frustrating to have this requirement in the development environment for speed and testing reasons. WDYT? Knowing that instances are exposed to the public with the dev environment, personally, I would be for enforcing it in any case, even if it could be a bump in the DX (when choosing to use a master key in development env) for the sake of security. Another issue I see with that is that some users may be frustrated to see that it's asked when going for production, aka exposing it to the public (if they change the env to production) -> They will be forced to change the master key and thus have to update every client because the API Keys are updated. IMO that's a super bump. CLI error message to indicate that the master key is not secure enoughNote: This is a suggestion
Do we want to give an extra helper to the error message?If yes, the chosen method should be indicated in the above error message.
|
Beta Was this translation helpful? Give feedback.
-
Hey everyone 👋 I'm locking that discussion since it will be released for Please open a new discussion to share feedback or ask for a feature request. Thank you all for your hard work 🙇♂️ |
Beta Was this translation helpful? Give feedback.
-
Sub-discussion for #536
Description
Some time ago, @brunoocasali initiated a product discussion regarding the master key behavior to naturally guide users to a secured usage of Meilisearch.
Since the @meilisearch/cloud-team uses the master key for all operations, we have been unable to make the changes that initially seemed to help strengthen security.
However, we could consider introducing a more demanding format to avoid users setting a weak master key like
12345678
ormasterKey
to add more security guidance.Beta Was this translation helpful? Give feedback.
All reactions