Hi,

On Wed, Jan 16, 2013 at 10:05 PM, jcbollinger <john.bollin...@stjude.org>wrote:

>
> Mostly.  The master normally runs as an unprivileged user, so file and
> directory access controls apply to it.  If you run SELinux in enforcing
> mode then SELinux policy applies no matter what user the master runs as.
> There are a couple of places to which the master needs to write (its log,
> its cache, ...), but appropriate access controls will prevent it from
> writing elsewhere (its config file, module directories, unrelated system
> directories, etc.).
>

Thanks for replying.

That's what we're kinda trying to do now but it's not just a matter of
limiting what the Puppet master can write I'm afraid. It's also important
what it can read.

We're using the Hiera GPG backend and the secret part of the key is stored
in the masters and must to be readable by the 'puppet' user so secrets can
be decrypted at catalog compilation time. Everyone could use a custom
function to read the key and put it in a place where it can be fetched
afterwards.

Dunno, looks like my concern is going beyond of my original question a bit.
I'm probably implicitly asking now if there's any way to totally disable
remote code execution.

About fine-grained ACLs on the writable directories, I still can think of
some cases where users might end up doing malicious things, for instance
erasing all the log files or even the facts cache living in
/var/lib/puppet/yaml/facts.

Nacho

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To post to this group, send email to puppet-users@googlegroups.com.
To unsubscribe from this group, send email to 
puppet-users+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/puppet-users?hl=en.

Reply via email to