On 03/03/2011 12:40 PM, George Reese wrote:
> So why don't we give the provider root access to our machines?
>
to be fair, a provider owns the hypervisor and storage, I would always
assume providers have root equivalent access if they want it. 


> Because there's a line between what is our responsibility and what is that of 
> the provider. Agents need to be invited elements, not required elements.

Agreed.  But it is acceptable to require an agent for certain features a
provider offers, i.e. password changes or support access.  In the end,
we can't force anyone to run an agent anyway .


> -George
>
> On Mar 3, 2011, at 12:36 PM, Ewan Mellor wrote:
>
>> The hypervisor can set your VM's memory or disk contents to anything it 
>> likes, set your registers to anything it likes, read all of memory, disk, 
>> and network, or even redirect you to a malicious TPM.  If you are going to 
>> execute code on a VM in the cloud, then you _have_ to trust the service 
>> provider -- no crypto in the world can protect you.
>>
>> In-guest agents just make it easier to do things, and they make it more 
>> transparent to the customer what we're doing and how.  There's no 
>> fundamental change in trust by having them.
>>
>> Ewan.
>>
>>> -----Original Message-----
>>> From: openstack-bounces+ewan.mellor=citrix....@lists.launchpad.net
>>> [mailto:openstack-bounces+ewan.mellor=citrix....@lists.launchpad.net]
>>> On Behalf Of George Reese
>>> Sent: 03 March 2011 15:36
>>> To: Ed Leafe
>>> Cc: Openstack; Mark Washenberger
>>> Subject: Re: [Openstack] OS API server password generation
>>>
>>> I don't agree with this approach.
>>>
>>> The current Cloud Servers approach is flawed. I wrote about this a year
>>> ago:
>>>
>>> http://broadcast.oreilly.com/2010/02/the-sacred-barrier.html
>>>
>>> It's a mistake to send OpenStack pursuing a flaw in Cloud Servers.
>>>
>>> -George
>>>
>>> On Mar 3, 2011, at 9:32 AM, Ed Leafe wrote:
>>>
>>>> On Mar 3, 2011, at 8:40 AM, George Reese wrote:
>>>>
>>>>> Any mechanism that requires an agent or requires any ability of the
>>> hypervisor or cloud platform to inject a password creates trust issues.
>>> In particular, the hypervisor and platform should avoid operations that
>>> reach into the guest. The guest should have the option of complete
>>> control over its data.
>>>>
>>>>    Please understand that this is a Rackspace-specific use case. It
>>> is not an OpenStack standard by any means. That's why this action is in
>>> a specific agent, not in the main OpenStack compute codebase. On an
>>> OpenStack list, we should be discussing the OpenStack code, not
>>> Rackspace's customization of that code for our use cases.
>>>>    Rackspace sells support. Customers are free to
>>> enable/disable/change whatever they want, with the understanding that
>>> it will limit the ability to directly support their instances. That
>>> decision is up to each customer, but our default is to build in the
>>> support mechanism. Other OpenStack deployments will choose to do things
>>> quite differently, I'm sure. It's even likely that in the future
>>> Rackspace may add a secure option like you describe, but for now we're
>>> focusing on parity with the current Cloud Servers product, and that
>>> includes password injection at creation.
>>>>
>>>>
>>>> -- Ed Leafe
>>>>
>>>>
>>>>
>>> --
>>> George Reese - Chief Technology Officer, enStratus
>>> e: george.re...@enstratus.com    t: @GeorgeReese    p: +1.207.956.0217
>>> f: +1.612.338.5041
>>> enStratus: Governance for Public, Private, and Hybrid Clouds -
>>> @enStratus - http://www.enstratus.com To schedule a meeting with me:
>>> http://tungle.me/GeorgeReese
>>>
>>>
> --
> George Reese - Chief Technology Officer, enStratus
> e: george.re...@enstratus.com    t: @GeorgeReese    p: +1.207.956.0217    f: 
> +1.612.338.5041
> enStratus: Governance for Public, Private, and Hybrid Clouds - @enStratus - 
> http://www.enstratus.com
> To schedule a meeting with me: http://tungle.me/GeorgeReese
>
>
>
>
>
> _______________________________________________
> Mailing list: https://launchpad.net/~openstack
> Post to     : openstack@lists.launchpad.net
> Unsubscribe : https://launchpad.net/~openstack
> More help   : https://help.launchpad.net/ListHelp


Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Mailing list: https://launchpad.net/~openstack
Post to     : openstack@lists.launchpad.net
Unsubscribe : https://launchpad.net/~openstack
More help   : https://help.launchpad.net/ListHelp

Reply via email to