Excerpts from Andrew Plunk's message of 2013-11-07 06:48:33 +0800:
> Hello All,
> 
> Imagine for a minute that you are displaying outputs from heat, but some of 
> those outputs could have sensitive data (think passwords or private keys). It 
> would be beneficial to allow outputs to be accessed once, and then go into a 
> locked state. This could result in the following:
> 

This is an interesting concept. I'd like to start with a problem
statement though, as it is not clear what this is meant to solve.

> 1). After an output is accessed for the first time, the output will become 
> locked, and subsequent calls to the engine to return that output will return 
> nothing.
> example:
> >show stack 
> 
> "outputs": {
>   "password": "password"
>  }
> 
> >show stack
> 
> "outputs": {
> }
> 
> 
> 2). Another option is after an output is accessed for the first time, the 
> output will become locked, and subsequent calls to the engine will return the 
> output with a flag saying that this output has been locked, allowing whatever 
> is consuming that output to take the necessary action.
> example:
> 
> >show stack
> 
> "outputs": {
>   "password": {
>     "value": "password",
>     "locked": false
>   }
> }
> 
> >show stack
> 
> "outputs": {
>   "password": {
>     "value": "password",
>     "locked": true
>   }
> }
> 
> 
> The outputs section of the template for either case would could look like:
> outputs:
>   password:
>     value: { get_attr: [ some_resource, some_value ] }
>     description: The password
>     view_once: True
> 

So it seems that the problem you are seeking to solve is limiting access
to sensitive outputs. The solution mentioned above certainly narrows
the attack surface, but it suffers from a DOS race condition where a
bad actor can lock you out of your own resource.

I have a different idea for that, which is to encrypt the output using
public key cryptography.

heat stack-create -f mytemplate.yaml -P PasswordRecipientKey="$(gpg
--armor --print-key m...@foo.com)"

And then have an output type of "Encrypted"

Outputs:
  Password:
    Type: Encrypted
    Keys:
      - {Ref: PasswordRecipientKey}

Now you can simply decrypt this with your local gpg key. heatclient
could even automatically do this for you making it transparent as long
as you have a gpg key agent running.

_______________________________________________
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to     : openstack@lists.openstack.org
Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack

Reply via email to