如何在Terraform中解密Windows管理员密码?

时间:2018-06-29 04:43:43

标签: amazon-web-services syntax interpolation terraform

我正在配置一个Windows服务器,以便在AWS中使用terraform进行测试。每次我需要使用PEM文件解密Windows密码来进行连接时。相反,我选择了terraform参数get_password_data并将我的password_data存储在tfstate文件中。现在如何使用插值语法rsadecrypt

解密相同的内容

请在下面找到我的Terraform代码

### Resource for EC2 instance creation ###

resource "aws_instance" "ec2" {
  ami                   =   "${var.ami}"
  instance_type         =   "${var.instance_type}"
  key_name              =   "${var.key_name}"
  subnet_id             =   "${var.subnet_id}"
  security_groups       =  ["${var.security_groups}"]
  availability_zone     =   "${var.availability_zone}"
  private_ip            =   "x.x.x.x"
  get_password_data     =   "true"

  connection {
    password            =   "${rsadecrypt(self.password_data)}"
    }

  root_block_device {
              volume_type = "${var.volume_type}"
              volume_size = "${var.volume_size}"
    delete_on_termination = "true"
    }

  tags {
        "Cost Center"  =  "R1"
        "Name"         =  "AD-test"
        "Purpose"      =  "Task"
        "Server Name"  =  "Active Directory"
        "SME Name"     =  "Ravi"
    }

}


output "instance_id" {
  value = "${aws_instance.ec2.id}"
}


### Resource for EBS volume creation ###

  resource "aws_ebs_volume" "additional_vol" {
    availability_zone =  "${var.availability_zone}"
    size              =  "${var.size}"
    type              =  "${var.type}"
}

### Output of Volume ID ###

  output "vol_id" {
    value = "${aws_ebs_volume.additional_vol.id}"
}

### Resource for Volume attachment ###

   resource "aws_volume_attachment" "attach_vol" {
     device_name       = "${var.device_name}"
     volume_id         = "${aws_ebs_volume.additional_vol.id}"
     instance_id       = "${aws_instance.ec2.id}"
     skip_destroy      = "true"
}

2 个答案:

答案 0 :(得分:5)

使用启动实例时指定的key_pair对密码进行加密,由于password_data仍然只是base64编码的已加密密码数据,因此您仍需要使用它来解密。

您应该使用${rsadecrypt(self.password_data,file("/path/to/private_key.pem"))}

这是有充分理由的。您真的不希望只是base64编码的密码在状态中浮动。

短版: 您缺少插值函数中的第二个参数。

答案 1 :(得分:0)

我知道这与实际问题无关,但是如果您不想在公共环境(例如Git)中公开私钥,这可能会很有用

我宁愿打印加密的密码

resource "aws_instance" "ec2" {
    ami = .....
    instance_type = .....
    security_groups = [.....]
    subnet_id = .....
    iam_instance_profile = .....
    key_name = .....
    get_password_data = "true"
    tags = {
        Name = .....
    }
}

output "Administrator_Password" {
   value = [
     aws_instance.ec2.password_data
   ]
 }

然后

  • 获取base64密码并将其放在名为pwdbase64.txt的文件中

  • 运行此命令将base64解码为bin文件

    certutil -decode pwdbase64.txt password.bin

  • 运行此命令以解密密码。bin

    openssl rsautl -decrypt -inkey privatekey.openssh -in password.bin

如果您不知道如何使用openssl。请检查this帖子

privatekey.openssh应该看起来像:

-----BEGIN RSA PRIVATE KEY-----
MIICXAIBAAKBgQCd+qQbLiSVuNludd67EtepR3g1+VzV6gjsZ+Q+RtuLf88cYQA3
6M4rjVAy......1svfaU/powWKk7WWeE58dnnTZoLvHQ
ZUvFlHE/LUHCQkx8sSECQGatJGiS5fgZhvpzLn4amNwKkozZ3tc02fMzu8IgdEit
jrk5Zq8Vg71vH1Z5OU0kjgrR4ZCjG9ngGdaFV7K7ki0=
-----END RSA PRIVATE KEY-----

公钥应类似于:

ssh-rsa AAAAB3NzaC1yc2EAAAADAQAB......iFZmwQ==

地形密钥对代码应类似于

resource "aws_key_pair" "key_pair_ec2" {
   key_name = "key_pair_ec2"
   public_key = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQAB......iFZmwQ=="
}

Pd:您可以使用puttygen生成密钥