On Mon, Sep 13, 2010 at 07:32:55PM +0200, Eystein Måløy Stenberg wrote:
> First off, Cfengine 3.1.0 due for October will have new functionality 
> for recognizing hosts. It uses the hash of the other party's public key 
> rather than the IP/DNS-address. Thus a host will be recognised even when 
> changing IP/DNS addresses.

Nice! This is exactly what I suggested in earlier mail and suits my
use case very well.

> Secondly, the well known key distribution/trust issue is not possible to 
> solve automatically without some external trusted channel. This is not a 
> limitation of Cfengine. Thus, you ideally should exchange keys manually 
> over some secure channel. What Cfengine allows is to assume trust from 
> IP/DNS ranges, which is OK sometimes in practice, but you can do it any 
> way you want.

Well, client bootstrapping is typically performed in controlled
environment so allowing initial trust for specific subnet is fine.

> In short, this is not an easy issue, and the more "user-friendly" you 
> make it, the less secure it becomes, as usual. Cfengine chooses the 
> secure route.

Regarding Cfengine security there is another point which is not yet
clear for me (probably off-topic): cross-client access to
configuration data.

For example, let's say we have /etc/ssmtp/ssmtp.conf with unique
clear-text password for each client machine and we want to manage it
via policy server. If one of the clients gets compromised (its private
key stolen), can attacker access other clients' ssmtp.conf files
stored on the same Cfengine server (while public key isn't disabled of
course)?

What is recommended way to handle such situations without violating
DRY principle (i.e. not having bunch of mostly identical ssmtp.conf
files for each client and lots of access rules)?

Thanks, Max
_______________________________________________
Help-cfengine mailing list
Help-cfengine@cfengine.org
https://cfengine.org/mailman/listinfo/help-cfengine

Reply via email to