Dave Cahill created CLOUDSTACK-1335:
---------------------------------------
Summary: SSH keys overwritten for user running management server
Key: CLOUDSTACK-1335
URL: https://issues.apache.org/jira/browse/CLOUDSTACK-1335
Project: CloudStack
Issue Type: Bug
Security Level: Public (Anyone can view this level - this is the default.)
Components: Management Server
Affects Versions: 4.2.0
Environment: Running the management server from source using:
mvn -pl :cloud-client-ui jetty:run
Running as a user other than "cloud"
Reporter: Dave Cahill
Fix For: 4.2.0
If the "ssh.privatekey" configuration entry is not present in the management
server database (e.g. after a database redeploy), the user who is running the
management server will have their *default* public / private keys
(/home/username/.ssh/id_rsa and /home/username/.ssh/id_rsa.pub) deleted and
overwritten with newly generated keys.
Having your default SSH keys blown away is really bad (and unexpected)
behaviour - any servers (e.g. GitHub) where you have your public key registered
will become inaccessible to you.
After discussion on-list [1], the preferred fix seems to be to have the
management server use a non-default filename for these ssh keys,
e.g. id_rsa.systemvm and id_rsa.pub.systemvm, to avoid damaging existing SSH
keys
There was also a suggestion to reuse the existing ssh key in developer mode;
i.e. if id_rsa.systemvm exists on disk, write that to the db and use it instead
of deleting and generating a new one.
[1] [DISCUSS] SSH keys overwritten for user running management server
http://markmail.org/message/csy3flezogjwcng5
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira