William,

Thanks!

Looks good to me now.

Joe

William Schumann wrote:
> Joe,
> Implemented your suggestions and resubmitted webrev.
> William
> 
> Joseph J VLcek wrote:
>> William,
>>
>> Summary of our phone conversation:
>>
>> 1 - check the logic @ line 596. What if no username but a password?
>> 596         if (asp.username != NULL && asp.userpass == NULL) {
>>
>> 2 - Some of the auto_log_print lines can fit on one 80 char line now.
>>
>> Joe
>>
>> William Schumann wrote:
>>> Joe,
>>>
>>> Joseph J VLcek wrote:
>>>> William Schumann wrote:
>>>>> Joe,
>>>>> To be clearer, if there are missing passwords in either a 
>>>>> user-supplied SC manifest or default.xml (which supplies the 
>>>>> default user, user password, and root password), the installation 
>>>>> will fail.
>>>>
>>>> This does not seem like a bad thing to me. As long as the failure 
>>>> generates an informative message so the user can quickly determine 
>>>> what went wrong.
>>> The messages needed some work.
>>> I coded it to:
>>> - fail if root password is missing
>>> - warn if user defined, but user password missing
>>>
>>> Changed logging so that stderr messages will appear as well as in log 
>>> (auto_log_print() does this).
>>>
>>> Updated webrev.
>>>
>>> Retesting in progress.
>>>
>>> William
>>>> Joe
>>>>
>>>>
>>>>
>>>>
>>>>> William
>>>>>
>>>>> Joseph J. VLcek wrote:
>>>>>> William,
>>>>>>
>>>>>> Sounds good to me. My brief comment below.
>>>>>>
>>>>>> Joe
>>>>>>
>>>>>> William Schumann wrote:
>>>>>>> Joe,
>>>>>>>
>>>>>>> Joseph J VLcek wrote:
>>>>>>>> William Schumann wrote:
>>>>>>>>> Default values for user and root passwords were not encrypted 
>>>>>>>>> as called for in:
>>>>>>>>>
>>>>>>>>> - 4246 The user and root password are not encrypted in SC manifest
>>>>>>>>>
>>>>>>>>> http://cr.opensolaris.org/~wmsch/bug-6622/
>>>>>>>>> http://defect.opensolaris.org/bz/show_bug.cgi?id=6622
>>>>>>>>>
>>>>>>>>> Edited default.xml in SUNW-installadm-tools to provide usable 
>>>>>>>>> encrypted passwords as described in bug report.
>>>>>>>>>
>>>>>>>>> user: jack password:jack
>>>>>>>>> root password: opensolaris
>>>>>>>>>
>>>>>>>>> Also added code to provide the same values if they are absent 
>>>>>>>>> from the SC manifest for whatever reason.
>>>>>>>>>
>>>>>>>>> Informational debugging message in Orchestrator can now display 
>>>>>>>>> the passwords, since they are encrypted.
>>>>>>>>>
>>>>>>>>> Tested default.xml changes going into SUNWinstalladm-tools 
>>>>>>>>> package on x86 and SPARC.
>>>>>>>>> Tested new auto-install and liborchestrator on x86 and SPARC. 
>>>>>>>>> Deleted entries from SC manifest and software generated correct 
>>>>>>>>> default values.
>>>>>>>>> _______________________________________________
>>>>>>>>> caiman-discuss mailing list
>>>>>>>>> caiman-discuss at opensolaris.org
>>>>>>>>> http://mail.opensolaris.org/mailman/listinfo/caiman-discuss
>>>>>>>>
>>>>>>>>
>>>>>>>> William,
>>>>>>>>
>>>>>>>>   Set the commit comment prior to generating the webrev. (I used 
>>>>>>>> to forget to do this too. ;)
>>>>>>>>
>>>>>>>>   Everything looks good...
>>>>>>>>
>>>>>>>>   Just some nits.
>>>>>>>>
>>>>>>>> Hope this helps!
>>>>>>>>
>>>>>>>> Joe
>>>>>>>>
>>>>>>>> usr/src/cmd/ai-webserver/default.xml
>>>>>>>> ++++++++++++++++++++++++++++++++++++
>>>>>>>>
>>>>>>>> Suggestion, Please consider:
>>>>>>>> ----------------------------
>>>>>>>>
>>>>>>>>   Is it considered safe to store encrypted defaults? 
>>>>>>> Well, I suppose that it's a usability question.  It is not safe 
>>>>>>> for an uninformed user; however, many current users are 
>>>>>>> evaluating AI and do not want to have to go through the process 
>>>>>>> of generating passwords and placing them in manifests.  Those 
>>>>>>> concerned with maximum security will change the passwords in the 
>>>>>>> manifest, protect manifests from public view, and change the 
>>>>>>> passwords upon reboot.
>>>>>>>> What if the encryption algorithm changes?
>>>>>>> AI controls the encryption algorithm via 
>>>>>>> /etc/security/policy.conf.  If the security policy were changed 
>>>>>>> in the distro, the default.xml passwords would also have to be 
>>>>>>> changed to work.
>>>>>>>>
>>>>>>>>   Since you added code to provide the defaults perhaps it might 
>>>>>>>> be safest to not list the encrypted defaults in the manifest.
>>>>>>> Again, it is inherently unsafe to provide default passwords 
>>>>>>> whether they are encrypted or not.  It is assumed that the 
>>>>>>> concerned user will override the defaults.  Perhaps it is a bad 
>>>>>>> idea to have the defaults in the code:  if the default passwords 
>>>>>>> are not provided in the code, the passwords could be removed from 
>>>>>>> default.ini on the server so that there are no defaults at all 
>>>>>>> (although I don't think this would be standard practice.)  A 
>>>>>>> custom distro could also have the default passwords removed.
>>>>>>>
>>>>>>> So, I am backing out the embedded passwords in the code, so that 
>>>>>>> if passwords are not provided in a manifest, the install will 
>>>>>>> fail.  I also backed out the logging statements exposing the 
>>>>>>> encrypted passwords in the log at an informational logging 
>>>>>>> level.  What do you think?
>>>>>>
>>>>>> This seems to me to be the correct thing to do.
>>>>>>
>>>>>>
>>>>>>>>
>>>>>>>> Question:
>>>>>>>> ---------
>>>>>>>>
>>>>>>>> Do/should we provide a mechanism or instructions for a user to 
>>>>>>>> generate the encrypted passwords if they want something besides 
>>>>>>>> the defaults?
>>>>>>> I have already provided instructions for this in the AI setup 
>>>>>>> HTML page and the design document.
>>>>>>>>
>>>>>>>> usr/src/cmd/auto-install/auto_install.c
>>>>>>>> +++++++++++++++++++++++++++++++++++++++
>>>>>>>>
>>>>>>>> Comments on line 580 and 598 are the same. 598 should be changed 
>>>>>>>> from:
>>>>>>>> 598         /* load user name from manifest or 'jack' */
>>>>>>>>
>>>>>>>> To:
>>>>>>>> 598         /* load user login name from manifest or 'jack' */
>>>>>>>>
>>>>>>> Changed.
>>>>>>>
>>>>>>> Thanks, Joe.  Please review the modifications.
>>>>>>> William
>>>>>>
>>>>
>>


Reply via email to