William,

Summary of our phone conversation:

1 - check the logic @ line 596. What if no username but a password?
596         if (asp.username != NULL && asp.userpass == NULL) {

2 - Some of the auto_log_print lines can fit on one 80 char line now.

Joe

William Schumann wrote:
> Joe,
> 
> Joseph J VLcek wrote:
>> William Schumann wrote:
>>> Joe,
>>> To be clearer, if there are missing passwords in either a 
>>> user-supplied SC manifest or default.xml (which supplies the default 
>>> user, user password, and root password), the installation will fail.
>>
>> This does not seem like a bad thing to me. As long as the failure 
>> generates an informative message so the user can quickly determine 
>> what went wrong.
> The messages needed some work.
> I coded it to:
> - fail if root password is missing
> - warn if user defined, but user password missing
> 
> Changed logging so that stderr messages will appear as well as in log 
> (auto_log_print() does this).
> 
> Updated webrev.
> 
> Retesting in progress.
> 
> William
>> Joe
>>
>>
>>
>>
>>> William
>>>
>>> Joseph J. VLcek wrote:
>>>> William,
>>>>
>>>> Sounds good to me. My brief comment below.
>>>>
>>>> Joe
>>>>
>>>> William Schumann wrote:
>>>>> Joe,
>>>>>
>>>>> Joseph J VLcek wrote:
>>>>>> William Schumann wrote:
>>>>>>> Default values for user and root passwords were not encrypted as 
>>>>>>> called for in:
>>>>>>>
>>>>>>> - 4246 The user and root password are not encrypted in SC manifest
>>>>>>>
>>>>>>> http://cr.opensolaris.org/~wmsch/bug-6622/
>>>>>>> http://defect.opensolaris.org/bz/show_bug.cgi?id=6622
>>>>>>>
>>>>>>> Edited default.xml in SUNW-installadm-tools to provide usable 
>>>>>>> encrypted passwords as described in bug report.
>>>>>>>
>>>>>>> user: jack password:jack
>>>>>>> root password: opensolaris
>>>>>>>
>>>>>>> Also added code to provide the same values if they are absent 
>>>>>>> from the SC manifest for whatever reason.
>>>>>>>
>>>>>>> Informational debugging message in Orchestrator can now display 
>>>>>>> the passwords, since they are encrypted.
>>>>>>>
>>>>>>> Tested default.xml changes going into SUNWinstalladm-tools 
>>>>>>> package on x86 and SPARC.
>>>>>>> Tested new auto-install and liborchestrator on x86 and SPARC. 
>>>>>>> Deleted entries from SC manifest and software generated correct 
>>>>>>> default values.
>>>>>>> _______________________________________________
>>>>>>> caiman-discuss mailing list
>>>>>>> caiman-discuss at opensolaris.org
>>>>>>> http://mail.opensolaris.org/mailman/listinfo/caiman-discuss
>>>>>>
>>>>>>
>>>>>> William,
>>>>>>
>>>>>>   Set the commit comment prior to generating the webrev. (I used 
>>>>>> to forget to do this too. ;)
>>>>>>
>>>>>>   Everything looks good...
>>>>>>
>>>>>>   Just some nits.
>>>>>>
>>>>>> Hope this helps!
>>>>>>
>>>>>> Joe
>>>>>>
>>>>>> usr/src/cmd/ai-webserver/default.xml
>>>>>> ++++++++++++++++++++++++++++++++++++
>>>>>>
>>>>>> Suggestion, Please consider:
>>>>>> ----------------------------
>>>>>>
>>>>>>   Is it considered safe to store encrypted defaults? 
>>>>> Well, I suppose that it's a usability question.  It is not safe for 
>>>>> an uninformed user; however, many current users are evaluating AI 
>>>>> and do not want to have to go through the process of generating 
>>>>> passwords and placing them in manifests.  Those concerned with 
>>>>> maximum security will change the passwords in the manifest, protect 
>>>>> manifests from public view, and change the passwords upon reboot.
>>>>>> What if the encryption algorithm changes?
>>>>> AI controls the encryption algorithm via 
>>>>> /etc/security/policy.conf.  If the security policy were changed in 
>>>>> the distro, the default.xml passwords would also have to be changed 
>>>>> to work.
>>>>>>
>>>>>>   Since you added code to provide the defaults perhaps it might be 
>>>>>> safest to not list the encrypted defaults in the manifest.
>>>>> Again, it is inherently unsafe to provide default passwords whether 
>>>>> they are encrypted or not.  It is assumed that the concerned user 
>>>>> will override the defaults.  Perhaps it is a bad idea to have the 
>>>>> defaults in the code:  if the default passwords are not provided in 
>>>>> the code, the passwords could be removed from default.ini on the 
>>>>> server so that there are no defaults at all (although I don't think 
>>>>> this would be standard practice.)  A custom distro could also have 
>>>>> the default passwords removed.
>>>>>
>>>>> So, I am backing out the embedded passwords in the code, so that if 
>>>>> passwords are not provided in a manifest, the install will fail.  I 
>>>>> also backed out the logging statements exposing the encrypted 
>>>>> passwords in the log at an informational logging level.  What do 
>>>>> you think?
>>>>
>>>> This seems to me to be the correct thing to do.
>>>>
>>>>
>>>>>>
>>>>>> Question:
>>>>>> ---------
>>>>>>
>>>>>> Do/should we provide a mechanism or instructions for a user to 
>>>>>> generate the encrypted passwords if they want something besides 
>>>>>> the defaults?
>>>>> I have already provided instructions for this in the AI setup HTML 
>>>>> page and the design document.
>>>>>>
>>>>>> usr/src/cmd/auto-install/auto_install.c
>>>>>> +++++++++++++++++++++++++++++++++++++++
>>>>>>
>>>>>> Comments on line 580 and 598 are the same. 598 should be changed 
>>>>>> from:
>>>>>> 598         /* load user name from manifest or 'jack' */
>>>>>>
>>>>>> To:
>>>>>> 598         /* load user login name from manifest or 'jack' */
>>>>>>
>>>>> Changed.
>>>>>
>>>>> Thanks, Joe.  Please review the modifications.
>>>>> William
>>>>
>>


Reply via email to