Probably should be re-written. Excuse any typos - sent from mobile device
> On Dec 2, 2014, at 21:58, Alireza Eskandari <astro.alir...@yahoo.com.INVALID> > wrote: > > John, +1If we provide password reset capability it should be secure, if not > it is better to make it disable at all.About source of windows version, so > what did we do? Should we write it from scratch? Why it isn't open?I open a > jira ticket, if you have any comment or suggestion please write > there.https://issues.apache.org/jira/browse/CLOUDSTACK-8009 > Thanks > From: John Kinsella <j...@stratosec.co> > To: "<dev@cloudstack.apache.org>" <dev@cloudstack.apache.org> > Sent: Wednesday, December 3, 2014 9:18 AM > Subject: Re: A secure way to reset VMs password > > It's not our place to enforce how users authenticate to their VMs. We provide > flexible options, suggest best practices, and let them use the tool as best > suits their needs. > > Excuse any typos - sent from mobile device > > > >> On Dec 2, 2014, at 21:22, Carlos Reategui <create...@gmail.com> wrote: >> >> Why do passwords at all? Why not just use ssh keys like AWS does. The >> functionality is already there just not in the ACS UI. Cloud-init already >> supports it which is available in most distros and therefore would not >> require CS specific scripts. At least not for linux. On windows I'm not >> exactly sure how AWS does it but I think it is also some kind of terminal >> services certificates so I think it could be made to work too. >> >> -Carlos >> >> >> >>> On Dec 2, 2014, at 2:35 PM, Chiradeep Vittal <chiradeep.vit...@citrix.com> >>> wrote: >>> >>> You would need client-side certs as well since the password server needs to >>> be able to validate WHO is asking for the password. Currently it is based >>> on the client's IP address. >>> Also the current scheme is a single-use password — as soon as the password >>> is retrieved, it is not available to anybody else (of course a MITM could >>> sniff the first exchange). >>> >>> You could eliminate a lot of MITM-style attacks by running the password >>> server locally on each hypervisor (hard for VMW), or by attaching an ISO >>> (containing the password) to the VM. >>> >>> From: John Kinsella <j...@stratosec.co<mailto:j...@stratosec.co>> >>> Reply-To: "dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org>" >>> <dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org>> >>> Date: Tuesday, December 2, 2014 at 1:32 PM >>> To: "dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org>" >>> <dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org>> >>> Subject: Re: A secure way to reset VMs password >>> >>> That password reset infrastructure has bigger issues than just SSL. The >>> server side works, but that’s about all I can say for it. This topic comes >>> up every 6-12 months. :) >>> >>> I thought there was a Jira entry but I can’t find it…personally I’d love to >>> see the client and server sides both rewritten from scratch. >>> >>> John >>> >>> On Nov 28, 2014, at 11:33 AM, Nux! <n...@li.nux.ro<mailto:n...@li.nux.ro>> >>> wrote: >>> Jayapal, >>> Not necesarily, one could run stunnel or nginx as SSL proxy on some other >>> port (8443?), this way SSL and non-SSL connections will still work and give >>> you plenty of time to update your templates, if you so wish. >>> Am I missing any important bits here? >>> Lucian >>> -- >>> Sent from the Delta quadrant using Borg technology! >>> Nux! >>> www.nux.ro >>> ----- Original Message ----- >>> From: "Jayapal Reddy Uradi" >>> <jayapalreddy.ur...@citrix.com<mailto:jayapalreddy.ur...@citrix.com>> >>> To: "<dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org>>" >>> <dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org>> >>> Cc: "Alireza Eskandari" >>> <astro.alir...@yahoo.com<mailto:astro.alir...@yahoo.com>> >>> Sent: Friday, 28 November, 2014 09:34:02 >>> Subject: Re: A secure way to reset VMs password >>> Another point to note is all the vms in production has to update >>> with the new cloud-set-guest-password scripts because of the new password >>> reset >>> method. >>> Thanks, >>> Jayapal >>> On 28-Nov-2014, at 2:28 PM, Erik Weber >>> <terbol...@gmail.com<mailto:terbol...@gmail.com>> >>> wrote: >>> On Thu, Nov 27, 2014 at 3:54 PM, Alireza Eskandari < >>> astro.alir...@yahoo.com.invalid<mailto:astro.alir...@yahoo.com.invalid>> >>> wrote: >>> HiI viewed the bash script that resets Linux password ( >>> http://download.cloud.com/templates/4.2/bindir/cloud-set-guest-password.in)It >>> seems that it doesn't use a secure way for transferring password string to >>> instance.Instances on a shared network can sniff password requests and >>> export requested password of other instances.I suggest to use SSL (https) >>> instead of plan text.Regards >>> I like the idea, but there's a couple of obstacles to overcome, namely >>> which SSL certificates to use. >>> - certificates need a subject name, ie. IP or hostname for web pages, you >>> could solve this by making the mgmt server a CA and have each VR get a >>> signed certificate by it, but it's complicated >>> - if the community bundle a pre generated certificate it is commonly known >>> and not to be trusted, also not sure how to handle subject name >>> - assuming everyone to supply a valid certificate is quite complicated (CA >>> must be on VR etc), and makes it considerably harder to get a working setup >>> - using self signed causes issues with validation >>> Don't get me wrong, I love the idea, but it's not just to flip a switch and >>> have (proper) SSL in place. >>> -- >>> Erik >