#1154: Allow signed manifests to eliminate single point of compromise
-------------------------+--------------------------------------------------
Reporter:  jgoldschrafe  |        Owner:  community 
    Type:  enhancement   |       Status:  new       
Priority:  normal        |    Component:  library   
 Version:                |     Severity:  normal    
Keywords:                |        Stage:  Unreviewed
   Patch:  None          |   Complexity:  Unknown   
-------------------------+--------------------------------------------------
 Puppet, like all configuration management systems, suffers from the
 possibility of being a single point of compromise, allowing arbitrary
 instructions to be run on all hosts accessing the Puppetmaster if a
 malicious manifest is crafted. Since the goal of Puppet more or less
 necessitates Puppet running as root on client systems, the amount of
 damage capable of being inflicted on client nodes is virtually limitless,
 and some optional extra precautions should be provided in order to limit
 the damage capable of being caused by a single rooted Puppetmaster.

 Signed manifests appear to be the easiest and most intuitive way to
 accomplish this. Like GPG-signed packages, they ensure that Puppet
 manifests have come from an authenticated source. By verifying the
 signature on manifests coming from the server, clients may verify that
 packages have been approved by the organization owning the Puppet server.

-- 
Ticket URL: <http://reductivelabs.com/trac/puppet/ticket/1154>
puppet <http://reductivelabs.com>
Puppet - Portable System Automation
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Puppet Bugs" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at 
http://groups.google.com/group/puppet-bugs?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to