@cameron I think not, but am interested in the use case for secret or privileged keys and/or values. What do you have in mind?
@cameron I've not yet read the RFC, so don't have an opinion on this specific case.
It would hardly count as insightful to point out that storing secrets in places not intended for that purpose is at best unwise, potentially harmful and irresponsible in cases in which suitable alternatives exist.
@AJCxZ0 I was looking at other operating systems to see how they did it, and both Linux and OpenBSD stored it in a sysctl so I figured that to be the most obvious.
Where do you think a better place to store it would be?
> An implementation MAY provide the means for the system administrator to display and change the secret key.
@cameron Since I have still done no research on this, I still lack an opinion and would like to see informed opinions on this.
The precedent you mention, which itself is a strong motivator for consistency, strongly suggests that this key does not need to be kept secret from those who can run code on the host.
In any case, you get points for seriously considering the matter.