A tool to generate an SSH key and set up the related files would be better than providing a default SSH key.
On 17 July 2014 14:44, Jean-Baptiste Onofré <j...@nanthrax.net> wrote: > Hi all, > > Following a discussion that we had with Christian, I would like to raise a > concern. > > Now, on Karaf 2.x/3.x/4.x, the JMX layer is secure using RBAC. The > MBeanServerBuilder is enabled by default, meaning that it's not possible to > locally connect to the MBean server. > I think it's good and secure. > > However, on the other hand, we have a key enabled by default (in > etc/keys.properties) and used by default by bin/client. > So it means that any user that download a Karaf distribution can connect > to any Karaf runtimes by default. > On one hand we have a very secure JMX layer (even for local connection), > but on the other hand, bin/client can connect to any Karaf running instance > (so not very secure). > > I would like to propose the following: > - in etc/keys.properties, we should comment out the default key. We can > document how to enable it and how to change the keys. > - in bin/client, we should be able to specify a key that we want to use. > > WDYT ? > > I already created some Jira about the keys: > - KARAF-2786: I would change this one by comment out the default key > - KARAF-2836 to allow to specify multiple keys for an user in > etc/keys.properties > - KARAF-2787 to allow to specify the key to bin/client > > Thanks, > Regards > JB > -- > Jean-Baptiste Onofré > jbono...@apache.org > http://blog.nanthrax.net > Talend - http://www.talend.com > -- Matt Sicker <boa...@gmail.com>