On 9/13/10 7:49 AM, "Max Arnold" <lwa...@gmail.com> wrote:
> On Mon, Sep 13, 2010 at 05:58:51PM +0400, Seva Gluschenko wrote:
>> Well, from my point of view, you have to add policy server's public
>> key to ppkeys/ on clients and to accept on trust certain ranges of IP
>> addresses reserved for clients. This way clients will trust the server
>> according to the pre-loaded key, and server will trust clients. The
>> trick is, you'll need to purge clients's keys from server's ppkeys/
>> directory to prevent authorization failures because of keys mess. The
>> threat is, an attacker could try controlling clients using the trusted
>> IP range, so you should avoid distribution of trustkeysfrom
>> configuration to clients.
> 
> This is sad... Tracking random ISP address pools is a painful and
> error-prone task. I want either unique client id/password or signed
> SSL certificate with my own CA in order to authenticate clients and
> control their access to policy server without relying on IP/DNS data.
> 
> Anyway, thank you for clarification.

I wonder if cert-based capabilities will be in nova?

A hacker that "controls" clients can not post anything back to the policy
server(s)...  So the threat is somewhat mitigated, and hopefully your
IDS/IPS is firing.

That said, I don't believe anything is stopping you (just like with cfengine
2.x) from disabling the security features you don't like and implementing
them yourself.  Stunnel is one approach I've heard discussed.

-- 
Mike Hoskins : micho...@cisco.com : +1 (415) 506-UNIX (8649)

He knows not how to know who knows not also how to unknow.
        -- Sir Richard Burton

_______________________________________________
Help-cfengine mailing list
Help-cfengine@cfengine.org
https://cfengine.org/mailman/listinfo/help-cfengine

Reply via email to