That password reset infrastructure has bigger issues than just SSL. The server 
side works, but that’s about all I can say for it. This topic comes up every 
6-12 months. :)

I thought there was a Jira entry but I can’t find it…personally I’d love to see 
the client and server sides both rewritten from scratch.

John

> On Nov 28, 2014, at 11:33 AM, Nux! <n...@li.nux.ro> wrote:
> 
> Jayapal,
> 
> Not necesarily, one could run stunnel or nginx as SSL proxy on some other 
> port (8443?), this way SSL and non-SSL connections will still work and give 
> you plenty of time to update your templates, if you so wish.
> 
> Am I missing any important bits here?
> 
> Lucian
> 
> --
> Sent from the Delta quadrant using Borg technology!
> 
> Nux!
> www.nux.ro
> 
> ----- Original Message -----
>> From: "Jayapal Reddy Uradi" <jayapalreddy.ur...@citrix.com>
>> To: "<dev@cloudstack.apache.org>" <dev@cloudstack.apache.org>
>> Cc: "Alireza Eskandari" <astro.alir...@yahoo.com>
>> Sent: Friday, 28 November, 2014 09:34:02
>> Subject: Re: A secure way to reset VMs password
> 
>> Another point to note is all the vms in production has to update
>> with the new cloud-set-guest-password scripts because of the new password 
>> reset
>> method.
>> 
>> Thanks,
>> Jayapal
>> 
>> 
>> 
>> On 28-Nov-2014, at 2:28 PM, Erik Weber <terbol...@gmail.com>
>> wrote:
>> 
>>> On Thu, Nov 27, 2014 at 3:54 PM, Alireza Eskandari <
>>> astro.alir...@yahoo.com.invalid> wrote:
>>> 
>>>> HiI viewed the bash script that resets Linux password (
>>>> http://download.cloud.com/templates/4.2/bindir/cloud-set-guest-password.in)It
>>>> seems that it doesn't use a secure way for transferring password string to
>>>> instance.Instances on a shared network can sniff password requests and
>>>> export requested password of other instances.I suggest to use SSL (https)
>>>> instead of plan text.Regards
>>>> 
>>>> 
>>> I like the idea, but there's a couple of obstacles to overcome, namely
>>> which SSL certificates to use.
>>> - certificates need a subject name, ie. IP or hostname for web pages, you
>>> could solve this by making the mgmt server a CA and have each VR get a
>>> signed certificate by it, but it's complicated
>>> - if the community bundle a pre generated certificate it is commonly known
>>> and not to be trusted, also not sure how to handle subject name
>>> - assuming everyone to supply a valid certificate is quite complicated (CA
>>> must be on VR etc), and makes it considerably harder to get a working setup
>>> - using self signed causes issues with validation
>>> 
>>> 
>>> Don't get me wrong, I love the idea, but it's not just to flip a switch and
>>> have (proper) SSL in place.
>>> 
>>> --
>>> Erik

Reply via email to