Le samedi 07 juin 2014 à 21:28 +0530, Anshu Prateek a écrit : > mmm, for your attack strategy to work, basically the "attacker" need > to have enough permissions in the first place to be able to execute > the playbook such that the playbooks have access to the mysql secret? > And if he already has that kinda permission, then there is no need to > do a setup first and then read it coz the attacker can read it upfront > without doing the setup. Then why do we use sudo and a filtering script if a attacker can inject any playbook ? My understanding was that people did have to commit first before being able to run something ( in order to provide auditing ), and that the sudo user do have access to stuff that the user/attacker don't ( like ssh keys, for example ). My understanding was also that there is a private repo is not readable by everybody, with various password, but that the user running ansible ( ie, the one accessible by sudo ) can read. And that sudo is used to make sure the initial user can only run ansible, nothing ore. If these assumptions are false, yeah, the attacker is more complex than needed. But as the idea is to permit to people who are not in sysadmin-main to run playbooks, I think my assumptions are correct. -- Michael Scherer _______________________________________________ infrastructure mailing list infrastructure@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/infrastructure