<div dir="ltr">How feasible (or unfeasible) would it be for each service to look for an encrypted conf file and use the clear text version if the encrypted file doesn't exist? The file could be all settings but technically only credentials and tokens would need this level of protection in my estimation.<div>

<br></div><div>I could envision doing this, for example, with OpenSSL as follows (bash for example):</div><div><div> #!/bin/bash</div><div> #OpenSSL file encryption</div><div>decrypt=credentials.txt</div><div>encrypt=${decrypt}.encrypted</div>
<div>if [[ $# -eq 0 ]] ; then #encrypt creds in file</div><div>    read username</div><div>    read -s password</div><div>    #write creds to the file</div><div><span class="" style="white-space:pre">  </span>echo ${username}:${password} | openssl des3 -salt  -out $encrypt</div>
<div>elif [[ $1 = '-d' ]] ; then<span class="" style="white-space:pre"> </span>#decrypt creds from file</div><div>    openssl des3 -d -salt -in $encrypt -out $decrypt</div><div>else</div><div>    echo "Error: $1 invalid. Decrypt='-d', Encrypt=no-args" >&2</div>
<div>    exit 1</div><div>fi</div></div><div><br></div><div>Thoughts? It just seems (to me of course) like a meaningful design option for companies who cannot afford to give credentials to all sysadmins with sudo access to *any* of the nodes for a given solution.</div>
<div><br></div><div><br></div></div><div class="gmail_extra"><br clear="all"><div><div dir="ltr"><div><font><div style="font-family:arial;font-size:small"><b><i><br>Adam Lawson</i></b></div><div><font><font color="#666666" size="1"><div style="font-family:arial;font-size:small">
AQORN, Inc.</div><div style="font-family:arial;font-size:small">427 North Tatnall Street</div><div style="font-family:arial;font-size:small">Ste. 58461</div><div style="font-family:arial;font-size:small">Wilmington, Delaware 19801-2230</div>
<div style="font-family:arial;font-size:small">Toll-free: (844) 4-AQORN-NOW</div><div style="font-family:arial;font-size:small">Direct: +1 (302) 268-6914</div></font></font></div></font></div><div style="font-family:arial;font-size:small">
<img src="http://www.aqorn.com/images/logo.png" width="96" height="39"><br></div></div></div>
<br><br><div class="gmail_quote">On Wed, Apr 23, 2014 at 7:24 AM, Tim Bell <span dir="ltr"><<a href="mailto:Tim.Bell@cern.ch" target="_blank">Tim.Bell@cern.ch</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">






<div lang="EN-GB" link="blue" vlink="purple">
<div>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><u></u> <u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">I think Jose from CERN has been putting in some work on the clients and the server for Kerberos in this area.
<u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><u></u> <u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">There were some problems with the Kerberos packaging and pre-reqs along with how to fake a Kerberos server in the test suite but
 he was making progress.<u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><u></u> <u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">Is this on the summit agenda ? It would be good to get it working since I think it was on my summit talk in Boston.<u></u><u></u></span></p>

<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><u></u> <u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">Tim<u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><u></u> <u></u></span></p>
<p class="MsoNormal"><b><span style="font-size:18.0pt;font-family:"Arial","sans-serif";color:#41454d">Activity Log<u></u><u></u></span></b></p>
<p class="MsoNormal"><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d"><img width="80" height="80" src="cid:image001.png@01CF5F10.86945FE0" alt="http://www.gravatar.com/avatar/a1040384?s=64&d=identicon"></span><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d"><u></u><u></u></span></p>

<p class="MsoNormal"><b><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d"><a href="http://stackalytics.com/?user_id=jose-castro-leon&project_type=all&release=all&metric=all&company=" target="_blank"><span style="color:#d32f1a;text-decoration:none">Jose
 Castro Leon</span></a> (<a href="http://stackalytics.com/?user_id=&project_type=all&release=all&metric=all&company=CERN" target="_blank"><span style="color:#d32f1a;text-decoration:none">CERN</span></a>)<u></u><u></u></span></b></p>

<p class="MsoNormal"><b><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d">08 Apr 2014 07:14:32 in <a href="http://stackalytics.com/?user_id=&project_type=all&release=all&metric=all&company=&module=python-keystoneclient" target="_blank"><span style="color:#d32f1a;text-decoration:none">python-keystoneclient</span></a><u></u><u></u></span></b></p>

<p class="MsoNormal"><b><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d">Review “Initial kerberos plugin implementation.”<u></u><u></u></span></b></p>
<p class="MsoNormal"><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d">Submitted by: <a href="http://stackalytics.com/?user_id=jose-castro-leon&project_type=all&release=all&metric=all&company=" target="_blank"><span style="color:#d32f1a;text-decoration:none">Jose
 Castro Leon</span></a> (<a href="http://stackalytics.com/?user_id=&project_type=all&release=all&metric=all&company=CERN" target="_blank"><span style="color:#d32f1a;text-decoration:none">CERN</span></a>) (#35)<u></u><u></u></span></p>

<p class="MsoNormal"><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d">Change Id: <a href="https://review.openstack.org/74974" target="_blank"><span style="color:#d32f1a;text-decoration:none">Idf02bf27b5933c00827dd08d11ac131896184ad8</span></a><u></u><u></u></span></p>

<p class="MsoNormal"><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:green">Code Review: <b>1</b><u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d"><img border="0" width="80" height="80" src="cid:image001.png@01CF5F10.86945FE0" alt="http://www.gravatar.com/avatar/a1040384?s=64&d=identicon"></span><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d"><u></u><u></u></span></p>

<p class="MsoNormal"><b><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d"><a href="http://stackalytics.com/?user_id=jose-castro-leon&project_type=all&release=all&metric=all&company=" target="_blank"><span style="color:#d32f1a;text-decoration:none">Jose
 Castro Leon</span></a> (<a href="http://stackalytics.com/?user_id=&project_type=all&release=all&metric=all&company=CERN" target="_blank"><span style="color:#d32f1a;text-decoration:none">CERN</span></a>)<u></u><u></u></span></b></p>

<p class="MsoNormal"><b><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d">02 Apr 2014 14:59:32 in <a href="http://stackalytics.com/?user_id=&project_type=all&release=all&metric=all&company=&module=requirements" target="_blank"><span style="color:#d32f1a;text-decoration:none">requirements</span></a><u></u><u></u></span></b></p>

<p class="MsoNormal"><b><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d">Review “kerberos requires an additional requests library. Older versions break in py33”<u></u><u></u></span></b></p>

<p class="MsoNormal"><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d">Submitted by: <a href="http://stackalytics.com/?user_id=ayoung&project_type=all&release=all&metric=all&company=" target="_blank"><span style="color:#d32f1a;text-decoration:none">Adam
 Young</span></a> (<a href="http://stackalytics.com/?user_id=&project_type=all&release=all&metric=all&company=Red+Hat" target="_blank"><span style="color:#d32f1a;text-decoration:none">Red Hat</span></a>) (#200)<u></u><u></u></span></p>

<p class="MsoNormal"><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d">Change Id: <a href="https://review.openstack.org/84740" target="_blank"><span style="color:#d32f1a;text-decoration:none">I2100915f123c0fea41d5b17d01947901aa0119c5</span></a><u></u><u></u></span></p>

<p class="MsoNormal"><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:green">Code Review: <b>1</b><u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d"><img border="0" width="80" height="80" src="cid:image002.png@01CF5F10.86945FE0" alt="http://www.gravatar.com/avatar/a1657571576?s=64&d=identicon"></span><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d"><u></u><u></u></span></p>

<p class="MsoNormal"><b><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d"><a href="http://stackalytics.com/?user_id=jose-castro-leon&project_type=all&release=all&metric=all&company=" target="_blank"><span style="color:#d32f1a;text-decoration:none">Jose
 Castro Leon</span></a> (<a href="http://stackalytics.com/?user_id=&project_type=all&release=all&metric=all&company=CERN" target="_blank"><span style="color:#d32f1a;text-decoration:none">CERN</span></a>)<u></u><u></u></span></b></p>

<p class="MsoNormal"><b><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d">20 Feb 2014 09:21:31 in <a href="http://stackalytics.com/?user_id=&project_type=all&release=all&metric=all&company=&module=python-keystoneclient" target="_blank"><span style="color:#d32f1a;text-decoration:none">python-keystoneclient</span></a><u></u><u></u></span></b></p>

<p class="MsoNormal"><b><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d">Patch “Initial kerberos plugin implementation.”<u></u><u></u></span></b></p>
<p class="MsoNormal"><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d">Current Status: ABANDONED<u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d">Change Id: <a href="https://review.openstack.org/74974" target="_blank"><span style="color:#d32f1a;text-decoration:none">Idf02bf27b5933c00827dd08d11ac131896184ad8</span></a><u></u><u></u></span></p>

<p class="MsoNormal"><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d"><img border="0" width="80" height="80" src="cid:image002.png@01CF5F10.86945FE0" alt="http://www.gravatar.com/avatar/a1657571576?s=64&d=identicon"></span><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d"><u></u><u></u></span></p>

<p class="MsoNormal"><b><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d"><a href="http://stackalytics.com/?user_id=jose-castro-leon&project_type=all&release=all&metric=all&company=" target="_blank"><span style="color:#d32f1a;text-decoration:none">Jose
 Castro Leon</span></a> (<a href="http://stackalytics.com/?user_id=&project_type=all&release=all&metric=all&company=CERN" target="_blank"><span style="color:#d32f1a;text-decoration:none">CERN</span></a>)<u></u><u></u></span></b></p>

<p class="MsoNormal"><b><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d">18 Feb 2014 10:19:23 in <a href="http://stackalytics.com/?user_id=&project_type=all&release=all&metric=all&company=&module=keystone" target="_blank"><span style="color:#d32f1a;text-decoration:none">keystone</span></a><u></u><u></u></span></b></p>

<p class="MsoNormal"><b><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d">Patch “Initial kerberos plugin implementation.”<u></u><u></u></span></b></p>
<p class="MsoNormal"><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d">Current Status: ABANDONED<u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:10.5pt;font-family:"Arial","sans-serif";color:#41454d">Change Id: <a href="https://review.openstack.org/74317" target="_blank"><span style="color:#d32f1a;text-decoration:none">I2fad67c3613c273187f6ca32985d360352c81bf8</span></a><u></u><u></u></span></p>

<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><u></u> <u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><u></u> <u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><u></u> <u></u></span></p>
<p class="MsoNormal"><b><span lang="EN-US" style="font-size:11.0pt;font-family:"Calibri","sans-serif"">From:</span></b><span lang="EN-US" style="font-size:11.0pt;font-family:"Calibri","sans-serif""> Nathanael Burton [mailto:<a href="mailto:nathanael.i.burton.work@gmail.com" target="_blank">nathanael.i.burton.work@gmail.com</a>]
<br>
<b>Sent:</b> 23 April 2014 14:42<br>
<b>To:</b> Adam Young</span></p><div><div class="h5"><br>
<b>Cc:</b> <a href="mailto:openstack-security@lists.openstack.org" target="_blank">openstack-security@lists.openstack.org</a><br>
<b>Subject:</b> Re: [Openstack-security] Credentials in clear text<u></u><u></u></div></div><p></p><div><div class="h5">
<p class="MsoNormal"><u></u> <u></u></p>
<p>We have to configure the Apache layer to set the component we want as the REMOTE_USER, but other than that I believe that's pretty much all it takes on the Keystone side. Changes were necessary to some of the Python clients and service code, mainly to get
 them to pass certificates along.  Not all these changes have been proposed upstream yet, although we plan to.<u></u><u></u></p>
<p>Thanks,<u></u><u></u></p>
<p>Nate<u></u><u></u></p>
</div></div><div><div><div class="h5">
<p class="MsoNormal">On Apr 23, 2014 8:33 AM, "Adam Young" <<a href="mailto:ayoung@redhat.com" target="_blank">ayoung@redhat.com</a>> wrote:<u></u><u></u></p>
</div></div><blockquote style="border:none;border-left:solid #cccccc 1.0pt;padding:0cm 0cm 0cm 6.0pt;margin-left:4.8pt;margin-right:0cm">
<div><div><div class="h5">
<div>
<p class="MsoNormal">On 04/23/2014 08:29 AM, Nathanael Burton wrote:<u></u><u></u></p>
</div>
<blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
<p>We do this today with X509 certificates using the external auth plugin for Keystone. Services and users auth directly with X509 certificates to get tokens.<u></u><u></u></p>
</blockquote>
<p class="MsoNormal"><br>
Have you modified it at all?  I have yet to try, but I though with mod_ssl and external, REMOTE_USER was not set.  It was my understanding that the following vars were set in its place:<br>
<br>
<a href="http://www.freeipa.org/page/Environment_Variables#X.509_Authentication" target="_blank">http://www.freeipa.org/page/Environment_Variables#X.509_Authentication</a><br>
<br>
<br>
<u></u><u></u></p>
</div></div><blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
<p>Nate<u></u><u></u></p>
<div><div><div class="h5">
<p class="MsoNormal">On Apr 23, 2014 12:23 AM, "Adam Young" <<a href="mailto:ayoung@redhat.com" target="_blank">ayoung@redhat.com</a>> wrote:<u></u><u></u></p>
</div></div><blockquote style="border:none;border-left:solid #cccccc 1.0pt;padding:0cm 0cm 0cm 6.0pt;margin-left:4.8pt;margin-right:0cm">
<div><div><div class="h5">
<div>
<p class="MsoNormal">On 04/22/2014 11:29 AM, Clark, Robert Graham wrote:<u></u><u></u></p>
</div>
<blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">As Bryan mentioned already, a user with access to production systems, particularly one with sudo/root
 access – is in an incredibly privileged position. On its own this is an auditing issue but it’s a recognised one. In most deployments subject to auditing (i.e. production) it’s likely that compensating controls such as gated access, user logging, MAC etc.
 are all in place to control the risk.</span><u></u><u></u></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">It’s a messy problem to deal with. I’ve seen approaches where the process and configuration file
 are both owned by an elevated user, once the process has loaded the configuration file it drops privs and can no longer read the file, this can be useful as a mechanism for avoiding directory traversal in web services etc I’m not sure how viable an approach
 this would be with something like Swift.</span><u></u><u></u></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span><u></u><u></u></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">-Rob</span><u></u><u></u></p>
</div>
</blockquote>
<p class="MsoNormal"><br>
I'd like to see a concerted effort to allowing all servcie to get keystone tokens with either Kerberos (keytabs) or X509 Client certificates.<br>
<br>
<br>
<u></u><u></u></p>
</div></div><blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span><u></u><u></u></p>
<div style="border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm 4.0pt"><div><div class="h5">
<div>
<div style="border:none;border-top:solid #e1e1e1 1.0pt;padding:3.0pt 0cm 0cm 0cm">
<p class="MsoNormal"><b><span lang="EN-US" style="font-size:11.0pt;font-family:"Calibri","sans-serif"">From:</span></b><span lang="EN-US" style="font-size:11.0pt;font-family:"Calibri","sans-serif"">
 Bryan D. Payne [<a href="mailto:bdpayne@acm.org" target="_blank">mailto:bdpayne@acm.org</a>]
<br>
<b>Sent:</b> 22 April 2014 01:16<br>
<b>To:</b> Adam Lawson<br>
<b>Cc:</b> <a href="mailto:openstack-security@lists.openstack.org" target="_blank">
openstack-security@lists.openstack.org</a><br>
<b>Subject:</b> Re: [Openstack-security] Credentials in clear text</span><u></u><u></u></p>
</div>
</div>
<p class="MsoNormal"> <u></u><u></u></p>
<div>
<p class="MsoNormal">This is fair.  I'm not personally familiar with Swift, so I will let others chime in on that.<u></u><u></u></p>
<div>
<p class="MsoNormal">-bryan<u></u><u></u></p>
</div>
</div>
</div></div><div>
<p class="MsoNormal" style="margin-bottom:12.0pt"> <u></u><u></u></p>
<div><div><div class="h5">
<p class="MsoNormal">On Mon, Apr 21, 2014 at 4:47 PM, Adam Lawson <<a href="mailto:alawson@aqorn.com" target="_blank">alawson@aqorn.com</a>> wrote:<u></u><u></u></p>
</div></div><blockquote style="border:none;border-left:solid #cccccc 1.0pt;padding:0cm 0cm 0cm 6.0pt;margin-left:4.8pt;margin-top:5.0pt;margin-right:0cm;margin-bottom:5.0pt"><div><div class="h5">
<div>
<p class="MsoNormal">Preventing access to passwords for the purpose of preventing unauthorized access to data as another way I look at it.<u></u><u></u></p>
</div>
</div></div><div>
<div>
<p class="MsoNormal"><br clear="all">
<u></u><u></u></p>
<div>
<div><div><div class="h5">
<div>
<div>
<p class="MsoNormal"><b><i><span style="font-family:"Arial","sans-serif""><br>
Adam Lawson</span></i></b><u></u><u></u></p>
</div>
<div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";color:#666666">AQORN, Inc.</span><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";color:#666666">427 North Tatnall Street</span><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";color:#666666">Ste. 58461</span><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";color:#666666">Wilmington, Delaware 19801-2230</span><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";color:#666666">Toll-free: (844) 4-AQORN-NOW</span><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";color:#666666">Direct:
</span><a href="tel:%2B1%20%28302%29%20268-6914" target="_blank"><span style="font-family:"Arial","sans-serif"">+1 (302) 268-6914</span></a><u></u><u></u></p>
</div>
</div>
</div>
</div></div><div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";border:solid windowtext 1.0pt;padding:0cm"><img border="0" width="120" height="49" src="cid:image003.jpg@01CF5F10.86945FE0" alt="Image removed by sender. http://www.aqorn.com/images/logo.png"></span><u></u><u></u></p>

</div>
</div>
</div>
<p class="MsoNormal" style="margin-bottom:12.0pt"> <u></u><u></u></p>
</div>
<div>
<div>
<div><div class="">
<p class="MsoNormal">On Mon, Apr 21, 2014 at 4:46 PM, Adam Lawson <<a href="mailto:alawson@aqorn.com" target="_blank">alawson@aqorn.com</a>> wrote:<u></u><u></u></p>
</div><blockquote style="border:none;border-left:solid #cccccc 1.0pt;padding:0cm 0cm 0cm 6.0pt;margin-left:4.8pt;margin-top:5.0pt;margin-right:0cm;margin-bottom:5.0pt"><div class="">
<div>
<p class="MsoNormal">My initial concern is specific to Swift and gaining global access to all data by virtue of having access to a single proxy node. It seems more than access to system resources but
 a flaw in how data is controlled (and passwords are controlled).<u></u><u></u></p>
</div>
</div><div>
<div>
<p class="MsoNormal"><br clear="all">
<u></u><u></u></p>
<div>
<div><div class="">
<div>
<div>
<p class="MsoNormal"><b><i><span style="font-family:"Arial","sans-serif""><br>
Adam Lawson</span></i></b><u></u><u></u></p>
</div>
<div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";color:#666666">AQORN, Inc.</span><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";color:#666666">427 North Tatnall Street</span><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";color:#666666">Ste. 58461</span><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";color:#666666">Wilmington, Delaware 19801-2230</span><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";color:#666666">Toll-free: (844) 4-AQORN-NOW</span><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";color:#666666">Direct:
</span><a href="tel:%2B1%20%28302%29%20268-6914" target="_blank"><span style="font-family:"Arial","sans-serif"">+1 (302) 268-6914</span></a><u></u><u></u></p>
</div>
</div>
</div>
</div><div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";border:solid windowtext 1.0pt;padding:0cm"><img border="0" width="120" height="49" src="cid:image003.jpg@01CF5F10.86945FE0" alt="Image removed by sender. http://www.aqorn.com/images/logo.png"></span><u></u><u></u></p>

</div>
</div>
</div>
<p class="MsoNormal" style="margin-bottom:12.0pt"> <u></u><u></u></p>
</div>
<div>
<div>
<div><div class="">
<p class="MsoNormal">On Mon, Apr 21, 2014 at 4:41 PM, Bryan D. Payne <<a href="mailto:bdpayne@acm.org" target="_blank">bdpayne@acm.org</a>> wrote:<u></u><u></u></p>
</div><blockquote style="border:none;border-left:solid #cccccc 1.0pt;padding:0cm 0cm 0cm 6.0pt;margin-left:4.8pt;margin-top:5.0pt;margin-right:0cm;margin-bottom:5.0pt"><div class="">
<div>
<p class="MsoNormal">This would be a nice hardening step, but if you have sudo on the box there's a lot of things you can do see.  This is just the tip of the iceberg.  For example, access to the backend
 db?  Access to traffic on the network / unix sockets / etc?  Access to logs.<u></u><u></u></p>
<div>
<p class="MsoNormal"> <u></u><u></u></p>
</div>
<div>
<p class="MsoNormal">I am not aware of any current efforts to mask this information from the config files.  But that doesn't mean it's not happening.  If someone is aware of such an effort, I'd certainly
 be interested in learning more about it.<u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"> <u></u><u></u></p>
</div>
<div>
<p class="MsoNormal">Cheers,<u></u><u></u></p>
</div>
<div>
<p class="MsoNormal">-bryan<u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"> <u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"> <u></u><u></u></p>
</div>
</div>
</div><div>
<p class="MsoNormal" style="margin-bottom:12.0pt"> <u></u><u></u></p>
<div><div class="">
<div>
<div>
<p class="MsoNormal">On Mon, Apr 21, 2014 at 4:26 PM, Adam Lawson <<a href="mailto:alawson@aqorn.com" target="_blank">alawson@aqorn.com</a>> wrote:<u></u><u></u></p>
</div>
</div>
</div><blockquote style="border:none;border-left:solid #cccccc 1.0pt;padding:0cm 0cm 0cm 6.0pt;margin-left:4.8pt;margin-top:5.0pt;margin-right:0cm;margin-bottom:5.0pt">
<div>
<div>
<div><div class="">
<p class="MsoNormal">Have .conf files containing credentials and tokens been addressed or being addressed? Seems there are a lot of keys to the kingdom clearly visible to staff who have access to systems
 for day-to-day admin work but don't/shouldn't be able to view them. If they have sudo access, they have everything they need to get where they don't belong. Really strikes me as an obvious audit issue...<u></u><u></u></p>

</div><div>
<div>
<p class="MsoNormal"><span style="color:#888888"><br clear="all">
</span><u></u><u></u></p>
<div>
<div><div class="">
<div>
<div>
<p class="MsoNormal"><b><i><span style="font-family:"Arial","sans-serif";color:#888888"><br>
Adam Lawson</span></i></b><u></u><u></u></p>
</div>
<div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";color:#666666">AQORN, Inc.</span><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";color:#666666">427 North Tatnall Street</span><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";color:#666666">Ste. 58461</span><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";color:#666666">Wilmington, Delaware 19801-2230</span><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";color:#666666">Toll-free: (844) 4-AQORN-NOW</span><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";color:#666666">Direct:
</span><a href="tel:%2B1%20%28302%29%20268-6914" target="_blank"><span style="font-family:"Arial","sans-serif"">+1 (302) 268-6914</span></a><u></u><u></u></p>
</div>
</div>
</div>
</div><div>
<p class="MsoNormal"><span style="font-family:"Arial","sans-serif";color:#888888;border:solid windowtext 1.0pt;padding:0cm"><img border="0" width="120" height="49" src="cid:image003.jpg@01CF5F10.86945FE0" alt="Image removed by sender. http://www.aqorn.com/images/logo.png"></span><u></u><u></u></p>

</div>
</div>
</div>
</div>
</div>
</div>
<p class="MsoNormal"> <u></u><u></u></p>
</div>
</div><div class="">
<p class="MsoNormal" style="margin-bottom:12.0pt">_______________________________________________<br>
Openstack-security mailing list<br>
<a href="mailto:Openstack-security@lists.openstack.org" target="_blank">Openstack-security@lists.openstack.org</a><br>
<a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security</a><u></u><u></u></p>
</div></blockquote>
</div>
<p class="MsoNormal"> <u></u><u></u></p>
</div>
</blockquote>
</div>
<p class="MsoNormal"> <u></u><u></u></p>
</div>
</div>
</div>
</blockquote>
</div>
<p class="MsoNormal"> <u></u><u></u></p>
</div>
</div>
</div>
</blockquote>
</div>
<p class="MsoNormal"> <u></u><u></u></p>
</div>
</div>
</div><div class="">
<p class="MsoNormal" style="margin-bottom:12.0pt"><u></u> <u></u></p>
<pre>_______________________________________________<u></u><u></u></pre>
<pre>Openstack-security mailing list<u></u><u></u></pre>
<pre><a href="mailto:Openstack-security@lists.openstack.org" target="_blank">Openstack-security@lists.openstack.org</a><u></u><u></u></pre>
<pre><a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security</a><u></u><u></u></pre>
</div></blockquote>
<p class="MsoNormal"><u></u> <u></u></p>
</div><div class="">
<p class="MsoNormal" style="margin-bottom:12.0pt"><br>
_______________________________________________<br>
Openstack-security mailing list<br>
<a href="mailto:Openstack-security@lists.openstack.org" target="_blank">Openstack-security@lists.openstack.org</a><br>
<a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security</a><u></u><u></u></p>
</div></blockquote>
</div>
</blockquote>
<p class="MsoNormal"><u></u> <u></u></p>
</div>
</blockquote>
</div>
</div>
</div>

<br>_______________________________________________<br>
Openstack-security mailing list<br>
<a href="mailto:Openstack-security@lists.openstack.org">Openstack-security@lists.openstack.org</a><br>
<a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security</a><br>
<br></blockquote></div><br></div>