<div dir="ltr">Are you talking about setting up the operating system (and it's various applications) such that all of the keys are generated uniquely? If so, this is very deployment specific and difficult to generalize on. If not, could you provide some more detail on what you are asking?<div>
<br></div><div>-bryan</div></div><div class="gmail_extra"><br><br><div class="gmail_quote">On Fri, Oct 25, 2013 at 12:25 AM, Jeffrey Walton <span dir="ltr"><<a href="mailto:noloader@gmail.com" target="_blank">noloader@gmail.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">I was reading through the OpenStack Security Guide dated Oct 25 2013<br>
for Havana (<a href="http://docs.openstack.org/sec/" target="_blank">http://docs.openstack.org/sec/</a>). Good job on that, by the<br>
way.<br>
<br>
Does anyone have a list of steps to perform to prepare or condition<br>
long term keys? For example, SSH keys should be regenerated, Samba's<br>
secret should probably be recreated (if present), Ubuntu's Snake Oil<br>
key should probably be deleted (if present), etc.<br>
<br>
I'm interested in both the bare metal OS and VM instances. (VM<br>
instances are somewhat covered under Chapter 43).<br>
<br>
Thanks in advance.<br>
<br>
_______________________________________________<br>
Openstack-security mailing list<br>
<a href="mailto:Openstack-security@lists.openstack.org">Openstack-security@lists.openstack.org</a><br>
<a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security</a><br>
</blockquote></div><br></div>