On Mon, Sep 13, 2010 at 05:58:51PM +0400, Seva Gluschenko wrote: > Well, from my point of view, you have to add policy server's public > key to ppkeys/ on clients and to accept on trust certain ranges of IP > addresses reserved for clients. This way clients will trust the server > according to the pre-loaded key, and server will trust clients. The > trick is, you'll need to purge clients's keys from server's ppkeys/ > directory to prevent authorization failures because of keys mess. The > threat is, an attacker could try controlling clients using the trusted > IP range, so you should avoid distribution of trustkeysfrom > configuration to clients.
This is sad... Tracking random ISP address pools is a painful and error-prone task. I want either unique client id/password or signed SSL certificate with my own CA in order to authenticate clients and control their access to policy server without relying on IP/DNS data. Anyway, thank you for clarification. _______________________________________________ Help-cfengine mailing list Help-cfengine@cfengine.org https://cfengine.org/mailman/listinfo/help-cfengine