Re: Review for new rbac_playbook

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Le samedi 07 juin 2014 à 21:28 +0530, Anshu Prateek a écrit :
> mmm, for your attack strategy to work, basically the "attacker" need
> to have enough permissions in the first place to be able to execute
> the playbook such that the playbooks have access to the mysql secret?
> And if he already has that kinda permission, then there is no need to
> do a setup first and then read it coz the attacker can read it upfront
> without doing the setup.

Then why do we use sudo and a filtering script if a attacker can inject
any playbook ? 

My understanding was that people did have to commit first before being
able to run something ( in order to provide auditing ), and that the
sudo user do have access to stuff that the user/attacker don't ( like
ssh keys, for example ). My understanding was also that there is a
private repo is not readable by everybody, with various password, but
that the user running ansible ( ie, the one accessible by sudo ) can
read. 

And that sudo is used to make sure the initial user can only run
ansible, nothing ore.

If these assumptions are false, yeah, the attacker is more complex than
needed. But as the idea is to permit to people who are not in
sysadmin-main to run playbooks, I think my assumptions are correct.
-- 
Michael Scherer

_______________________________________________
infrastructure mailing list
infrastructure@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/infrastructure





[Index of Archives]     [Fedora Development]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [KDE Users]

  Powered by Linux