On Dec 22, 2010, at 7:35 PM, Derek Yarnell wrote:

> On 12/22/10 8:38 PM, Patrick wrote:
>> 
>> On Dec 22, 2010, at 5:18 PM, Derek Yarnell wrote:
>> 
>>> So I was asked a bit about implications of distributing something
>>> sensitive through puppet.  After a client talks to the puppet server
>>> (giving its local facts) and retrieves its catalog is the client allowed
>>> to fetch resources that may not be defined in its catalog?
>>> 
>>> For example if someone is crafty and has compromised a client can they
>>> retrieve a file from the file server that was not in their catalog?  Or
>>> can this only be secured this only handled by the file server IP acls
>>> (if you really call that secure)?
>> 
>> 
>> Just to confirm that.  Any client with a valid certificate can get any file 
>> in any "files" directory unless you make changes.  Templates are different 
>> because the templates are put into the catalog, so a client can only use 
>> templates you use in the catalog.
>> 
> 
> Ok so is the only way to secure the files is via IP/hostname or am I
> missing something in the auth.conf?


I think you can use wildcards in your hostnames which might help.

I know of two other indirect ways to secure files.

1) Use "source" and the file() function to embed the files in the catalog 
instead of putting them in a "files" folder.  Templates do the same thing.

2) Tinker with /etc/puppet/fileserver.conf to add private mounts like this:

Add this to fileserver.conf:
[private]
        path /etc/puppet/private/%d/%h
        allow *

Now, when I client with a certificate name of server.example.com asks for 
puppet:///private/ it will get /etc/puppet/private/example.com/server/

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/puppet-users?hl=en.

Reply via email to