- From: "Julian C. Dunn" <
>
- To:
- Subject: [chef] Re: RE: Re: Securing Knife
- Date: Thu, 7 Nov 2013 18:39:38 -0500
Joe,
It's the first time I've heard this raised as a concern, but that
doesn't mean it's not valid. I think the use case so far has been that
each Chef admin has the PEM on their local workstations as opposed to
a shared workstation/jumpbox.
However, one has to balance usability versus security. Even if Knife
only prompted once per command for the user's passphrase, that still
seems like a PITA. Doesn't that get in the way of operations?
Again, I think it's a feature request that we would consider if you
can define how you see PEM passphrases would work without being too
intrusive.
- Julian
On Thu, Nov 7, 2013 at 7:33 AM, Kadel-Garcia, Nico
<
>
wrote:
>
Such a private pem file is still stored locally, effectively in plain-text,
>
with no password protection. For home directories on poorly secured NFS
>
mounts it's even worse because any host connected to the relevant network
>
can NFS mount the directory, "sudo" to the relevant uid, and gain access to
>
the unencrypted keys. NFSv4 with Kerberized authentication can help with
>
that, as can proper CIFS configurations for Windows based fileshares, but
>
the key is still available on all backup media in plaintext.
>
>
I'd recommend using a highly secured local disk area, such as an encrypted
>
partition, and a symlink from the relevant workspace to the locally
>
encrypted partition. And I'd suggest running chef server operations only
>
from that secured workspace, especially for sensitive environments and
>
source code manipulation. Since the source code for the cookbooks can often
>
be used to manipulate or ruin deployed systems, similar precautions should
>
be used for SSH keys for any central source repository.
>
>
And as mentioned, don't forget to passphrase protect SSH keys? The old
>
"keychain" perl script works well for managing personal SSH keys in
>
command-line environments, and many modern window manager environments like
>
Gnome and KDE have built-in tools for SSH key management.
>
>
________________________________
>
From: Mike
>
>
>
Sent: Wednesday, November 06, 2013 5:45 PM
>
To:
>
>
Subject: [chef] Re: Securing Knife
>
>
Have individual/personal admin-level pem files - don't share a centralized
>
one.
>
>
knife client create new_person --admin
>
>
Ref: http://docs.opscode.com/chef/knife.html#create
>
>
-M
>
>
>
On Wed, Nov 6, 2013 at 5:40 PM, Kemp, Joseph A. (JKEMP)
>
<
>
>
wrote:
>
>
>
> I am puzzled how to secure the use of knife in open source chef. If I add
>
> a password to the user PEM I am forced to enter the password multiple times
>
> for each knife command. So that’s not a very user friendly option.
>
> Someone
>
> else suggested storing the pem on an encrypted file system/device/etc.
>
> What
>
> is the best practice to provide controlled admin access to the chef server?
>
> It’s a little unnerving that someone with a copy of any admin PEM file
>
> gains
>
> complete control over your infrastructure. I feel like I must be missing
>
> something.
>
>
>
>
>
>
>
> Thanks,
>
>
>
> -Joe
>
>
--
[ Julian C. Dunn
<
>
* Sorry, I'm ]
[ WWW:
http://www.aquezada.com/staff/julian * only Web 1.0 ]
[
gopher://sdf.org/1/users/keymaker/ * compliant! ]
[ PGP: 91B3 7A9D 683C 7C16 715F 442C 6065 D533 FDC2 05B9 ]
- [chef] Securing Knife, Kemp, Joseph A. (JKEMP), 11/06/2013
- [chef] Re: Securing Knife, Mike, 11/06/2013
- [chef] RE: Re: Securing Knife, Kemp, Joseph A. (JKEMP), 11/06/2013
- [chef] RE: Re: Securing Knife, Kadel-Garcia, Nico, 11/07/2013
- [chef] Re: RE: Re: Securing Knife, Julian C. Dunn, 11/07/2013
- [chef] RE: Re: RE: Re: Securing Knife, Kemp, Joseph A. (JKEMP), 11/07/2013
- [chef] Re: RE: Re: RE: Re: Securing Knife, Ranjib Dey, 11/07/2013
- [chef] Re: Re: RE: Re: RE: Re: Securing Knife, Lamont Granquist, 11/09/2013
- [chef] RE: Re: Re: RE: Re: RE: Re: Securing Knife, Kadel-Garcia, Nico, 11/09/2013
- [chef] Re: RE: Re: Re: RE: Re: RE: Re: Securing Knife, Phil Cryer, 11/09/2013
- [chef] Re: RE: Re: Re: RE: Re: RE: Re: Securing Knife, Lamont Granquist, 11/10/2013
- [chef] RE: Re: RE: Re: Re: RE: Re: RE: Re: Securing Knife, Kemp, Joseph A. (JKEMP), 11/18/2013
- [chef] Re: RE: Re: RE: Re: Securing Knife, Seth Falcon, 11/07/2013
[chef] Re: Securing Knife, Steffen Gebert, 11/10/2013
Archive powered by MHonArc 2.6.16.