Passwords are most definitely a necessity, but not having SSH Keys in the
GUI at this point just doesn't make any sense.

To clarify my thoughts on the current password system: I think a re-write
would be great, but it should include an "insecure/legacy" option (probably
as a global setting) that would continue to function with the current reset
scripts.


Thank You,

Logan Barfield
Tranquil Hosting

On Wed, Dec 3, 2014 at 10:55 AM, Andrija Panic <andrija.pa...@gmail.com>
wrote:

> +1 what Nux said - I'm aware of many web developers NOT knowing what the
> SSH keys are at all, and thus not using them... most of them relly on
> passwords... but nice to have ssh keys for rest of us.
>
> On 3 December 2014 at 16:52, Nux! <n...@li.nux.ro> wrote:
>
> > Keys are not for everyone. Passwords are still used a lot.
> >
> > --
> > Sent from the Delta quadrant using Borg technology!
> >
> > Nux!
> > www.nux.ro
> >
> > ----- Original Message -----
> > > From: "Carlos Reategui" <create...@gmail.com>
> > > To: dev@cloudstack.apache.org
> > > Sent: Wednesday, 3 December, 2014 05:19:07
> > > Subject: Re: A secure way to reset VMs password
> >
> > > Why do passwords at all?  Why not just use ssh keys like AWS does. The
> > > functionality is already there just not in the ACS UI. Cloud-init
> already
> > > supports it which is available in most distros and therefore would not
> > require
> > > CS specific scripts. At least not for linux. On windows I'm not exactly
> > sure
> > > how AWS does it but I think it is also some kind of terminal services
> > > certificates so I think it could be made to work too.
> > >
> > > -Carlos
> > >
> > >
> > >
> > >> On Dec 2, 2014, at 2:35 PM, Chiradeep Vittal <
> > chiradeep.vit...@citrix.com>
> > >> wrote:
> > >>
> > >> You would need client-side certs as well since the password server
> > needs to be
> > >> able to validate WHO is asking for the password. Currently it is based
> > on the
> > >> client's IP address.
> > >> Also the current scheme is a single-use password — as soon as the
> > password is
> > >> retrieved, it is not available to anybody else (of course a MITM could
> > sniff
> > >> the first exchange).
> > >>
> > >> You could eliminate a lot of MITM-style attacks by running the
> password
> > server
> > >> locally on each hypervisor (hard for VMW), or by attaching an ISO
> > (containing
> > >> the password) to the VM.
> > >>
> > >> From: John Kinsella <j...@stratosec.co<mailto:j...@stratosec.co>>
> > >> Reply-To: "dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org
> >"
> > >> <dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org>>
> > >> Date: Tuesday, December 2, 2014 at 1:32 PM
> > >> To: "dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org>"
> > >> <dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org>>
> > >> Subject: Re: A secure way to reset VMs password
> > >>
> > >> That password reset infrastructure has bigger issues than just SSL.
> The
> > server
> > >> side works, but that’s about all I can say for it. This topic comes up
> > every
> > >> 6-12 months. :)
> > >>
> > >> I thought there was a Jira entry but I can’t find it…personally I’d
> > love to see
> > >> the client and server sides both rewritten from scratch.
> > >>
> > >> John
> > >>
> > >> On Nov 28, 2014, at 11:33 AM, Nux! <n...@li.nux.ro<mailto:
> n...@li.nux.ro>>
> > wrote:
> > >> Jayapal,
> > >> Not necesarily, one could run stunnel or nginx as SSL proxy on some
> > other port
> > >> (8443?), this way SSL and non-SSL connections will still work and give
> > you
> > >> plenty of time to update your templates, if you so wish.
> > >> Am I missing any important bits here?
> > >> Lucian
> > >> --
> > >> Sent from the Delta quadrant using Borg technology!
> > >> Nux!
> > >> www.nux.ro
> > >> ----- Original Message -----
> > >> From: "Jayapal Reddy Uradi"
> > >> <jayapalreddy.ur...@citrix.com<mailto:jayapalreddy.ur...@citrix.com>>
> > >> To: "<dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org>>"
> > >> <dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org>>
> > >> Cc: "Alireza Eskandari"
> > >> <astro.alir...@yahoo.com<mailto:astro.alir...@yahoo.com>>
> > >> Sent: Friday, 28 November, 2014 09:34:02
> > >> Subject: Re: A secure way to reset VMs password
> > >> Another point to note is all the vms in production has to update
> > >> with the new cloud-set-guest-password scripts because of the new
> > password reset
> > >> method.
> > >> Thanks,
> > >> Jayapal
> > >> On 28-Nov-2014, at 2:28 PM, Erik Weber
> > >> <terbol...@gmail.com<mailto:terbol...@gmail.com>>
> > >> wrote:
> > >> On Thu, Nov 27, 2014 at 3:54 PM, Alireza Eskandari <
> > >> astro.alir...@yahoo.com.invalid<mailto:
> astro.alir...@yahoo.com.invalid>>
> > wrote:
> > >> HiI viewed the bash script that resets Linux password (
> > >>
> >
> http://download.cloud.com/templates/4.2/bindir/cloud-set-guest-password.in)It
> > >> seems that it doesn't use a secure way for transferring password
> string
> > to
> > >> instance.Instances on a shared network can sniff password requests and
> > >> export requested password of other instances.I suggest to use SSL
> > (https)
> > >> instead of plan text.Regards
> > >> I like the idea, but there's a couple of obstacles to overcome, namely
> > >> which SSL certificates to use.
> > >> - certificates need a subject name, ie. IP or hostname for web pages,
> > you
> > >> could solve this by making the mgmt server a CA and have each VR get a
> > >> signed certificate by it, but it's complicated
> > >> - if the community bundle a pre generated certificate it is commonly
> > known
> > >> and not to be trusted, also not sure how to handle subject name
> > >> - assuming everyone to supply a valid certificate is quite complicated
> > (CA
> > >> must be on VR etc), and makes it considerably harder to get a working
> > setup
> > >> - using self signed causes issues with validation
> > >> Don't get me wrong, I love the idea, but it's not just to flip a
> switch
> > and
> > >> have (proper) SSL in place.
> > >> --
> > >> Erik
> > >>
> >
>
>
>
> --
>
> Andrija Panić
>

Reply via email to