Min,

Why are we mucking with ACLs at all?  The best security practice would be
to create a bucket for CloudStack's use and assign it a dedicated access
key and secret key pair with read/write access only to that bucket.
 Requiring an administrative account to an object store opens an
unnecessarily large attack surface.  Therefore, as implemented in 4.1, we
should defer bucket creation, ACL assignment, and credential creation to
the administrator/operator.

Thanks,
-John

On Jun 17, 2013, at 1:15 PM, Min Chen <min.c...@citrix.com> wrote:

 Tom filed a very good bug for ACL setting change on S3 object when users
issue extractTemplate API (
https://issues.apache.org/jira/browse/CLOUDSTACK-3030), and his
recommendation of using Query String Request Authentication (QSRA)
alternative sounds like a right approach to fix this bug. Before
implementing it, I would like to confirm if QSRA should be supported by all
S3 providers if they claim that they are AWS s3 compatible. If so, we will
make this assumption in our code. Based on Tom, Cloudian is supporting it.
How about RiakCS, John?

 Thanks
-min

Reply via email to