On 10/04/2010 04:52 PM, Benjamin Kite wrote:
> On Mon, Oct 4, 2010 at 4:47 PM, Mohamed Lrhazi <lrh...@gmail.com> wrote:
>> I was wondering how easy/hard is it for a hacker to control my hosts
>> by impersonating puppetmaster, say by poisoning DNS to point
>> puppet.dom.ain to their own server?
>> Are there reasosns why that would not work?
> 
> The SSL layer and its key exchange mechanism should handle that.
> 

It most definitely does.

Your clients cache the master's certificate.

You could technically have a problem if you
1. make a certificate request from a new client and
2. don't see the request in your puppet master's puppetca.

Then an attacker could sign the hijacked request and impersonate a
master for your new client.

Needless to say, if that happens, make sure to erase the certificate
that the newly compromised node has saved.

Cheers,
Felix

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To post to this group, send email to puppet-us...@googlegroups.com.
To unsubscribe from this group, send email to 
puppet-users+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/puppet-users?hl=en.

Reply via email to