-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Review of pool-wide ssh design #184
Comments
Mistake?
I think that was meant to be s/field/file/ there. Small detail of implementation:To make sshd reread its configuration file we don't have to restart it: we can send it a SIGHUP. (Although maybe it would be good to restart anyway? Do we want to kill existing ssh sessions or not?) Key revocationIt would be simpler to do without I would favour doing it that way if we have a purpose-specific user as which these ssh connections are made: if an admin wants to configure the host to allow other humans or services to make key-based ssh connections, those connections will have to be as some other user(s) using a different file of authorised keys. The alternative would be harder: the function called when |
re field/file, good spot thanks. As far as the revocation goes, I think I agree, let's just make the authorized_keys == \sum host.ssh_authentication_public_key Also, let's go for the 'new user' thing. One last think I was considering - perhaps we could add a pool-wide 'additional_authorized_keys' list? one that an API user could add and remove from? That'd be very handy. |
User and privilegeI think conceptually we probably still want something similar to the "call-plugin" concept: we don't want to give the SMAPI backend unrestricted authority to do anything and everything on other hosts, but only to make those hosts run certain scripts or actions. So could we define a user account like "plugin_user" or even "remote_smapi"? Then for that user to invoke actions that require higher privileges, perhaps a suitably configured arrangement based on
|
We can also restrict the relevant user's privileges in some other ways, e.g.
|
I can see this being used more widely than smapiv3, so I'd go for a more generic 'xapi' user or something similar. Sudo gives quite configurable control over what can be executed, so we could set that up to only allow to sudo execute files within a particular path or something similar? |
For review of https://xapi-project.github.io/xapi/futures/pool-wide-ssh/pool-wide-ssh.html
The text was updated successfully, but these errors were encountered: