← Back to team overview

openstack team mailing list archive

Re: OS API server password generation

 

Agents aren't compulsory.  If you don't like them, turn them off.  It's totally within your power to do so.  Just don't go complaining to your service provider when they can't reset your root password for you.

You could even replace the agent with one of your own that performed some functions but not others.  That's also within your power.  Having an agent there makes it clear and obvious which things the service provider will try to do.  It's much more transparent than having the provider delve into your rootfs to fix things for you.

Ewan.

> -----Original Message-----
> From: George Reese [mailto:george.reese@xxxxxxxxxxxxx]
> Sent: 03 March 2011 18:41
> To: Ewan Mellor
> Cc: Ed Leafe; Openstack; Mark Washenberger
> Subject: Re: [Openstack] OS API server password generation
> 
> So why don't we give the provider root access to our machines?
> 
> Because there's a line between what is our responsibility and what is
> that of the provider. Agents need to be invited elements, not required
> elements.
> 
> -George
> 
> On Mar 3, 2011, at 12:36 PM, Ewan Mellor wrote:
> 
> > The hypervisor can set your VM's memory or disk contents to anything
> it likes, set your registers to anything it likes, read all of memory,
> disk, and network, or even redirect you to a malicious TPM.  If you are
> going to execute code on a VM in the cloud, then you _have_ to trust
> the service provider -- no crypto in the world can protect you.
> >
> > In-guest agents just make it easier to do things, and they make it
> more transparent to the customer what we're doing and how.  There's no
> fundamental change in trust by having them.
> >
> > Ewan.
> >
> >> -----Original Message-----
> >> From: openstack-bounces+ewan.mellor=citrix.com@xxxxxxxxxxxxxxxxxxx
> >> [mailto:openstack-
> bounces+ewan.mellor=citrix.com@xxxxxxxxxxxxxxxxxxx]
> >> On Behalf Of George Reese
> >> Sent: 03 March 2011 15:36
> >> To: Ed Leafe
> >> Cc: Openstack; Mark Washenberger
> >> Subject: Re: [Openstack] OS API server password generation
> >>
> >> I don't agree with this approach.
> >>
> >> The current Cloud Servers approach is flawed. I wrote about this a
> year
> >> ago:
> >>
> >> http://broadcast.oreilly.com/2010/02/the-sacred-barrier.html
> >>
> >> It's a mistake to send OpenStack pursuing a flaw in Cloud Servers.
> >>
> >> -George
> >>
> >> On Mar 3, 2011, at 9:32 AM, Ed Leafe wrote:
> >>
> >>> On Mar 3, 2011, at 8:40 AM, George Reese wrote:
> >>>
> >>>> Any mechanism that requires an agent or requires any ability of
> the
> >> hypervisor or cloud platform to inject a password creates trust
> issues.
> >> In particular, the hypervisor and platform should avoid operations
> that
> >> reach into the guest. The guest should have the option of complete
> >> control over its data.
> >>>
> >>>
> >>> 	Please understand that this is a Rackspace-specific use case. It
> >> is not an OpenStack standard by any means. That's why this action is
> in
> >> a specific agent, not in the main OpenStack compute codebase. On an
> >> OpenStack list, we should be discussing the OpenStack code, not
> >> Rackspace's customization of that code for our use cases.
> >>>
> >>> 	Rackspace sells support. Customers are free to
> >> enable/disable/change whatever they want, with the understanding
> that
> >> it will limit the ability to directly support their instances. That
> >> decision is up to each customer, but our default is to build in the
> >> support mechanism. Other OpenStack deployments will choose to do
> things
> >> quite differently, I'm sure. It's even likely that in the future
> >> Rackspace may add a secure option like you describe, but for now
> we're
> >> focusing on parity with the current Cloud Servers product, and that
> >> includes password injection at creation.
> >>>
> >>>
> >>>
> >>> -- Ed Leafe
> >>>
> >>>
> >>>
> >>
> >> --
> >> George Reese - Chief Technology Officer, enStratus
> >> e: george.reese@xxxxxxxxxxxxx    t: @GeorgeReese    p:
> +1.207.956.0217
> >> f: +1.612.338.5041
> >> enStratus: Governance for Public, Private, and Hybrid Clouds -
> >> @enStratus - http://www.enstratus.com To schedule a meeting with me:
> >> http://tungle.me/GeorgeReese
> >>
> >>
> >
> 
> --
> George Reese - Chief Technology Officer, enStratus
> e: george.reese@xxxxxxxxxxxxx    t: @GeorgeReese    p: +1.207.956.0217
> f: +1.612.338.5041
> enStratus: Governance for Public, Private, and Hybrid Clouds -
> @enStratus - http://www.enstratus.com
> To schedule a meeting with me: http://tungle.me/GeorgeReese
> 
> 




References