pcp
[Top] [All Lists]

Re: pcp updates: lberk/marko merges, build+docs updates

To: Nathan Scott <nathans@xxxxxxxxxx>
Subject: Re: pcp updates: lberk/marko merges, build+docs updates
From: "Frank Ch. Eigler" <fche@xxxxxxxxxx>
Date: Tue, 5 Jan 2016 17:51:38 -0500
Cc: pcp developers <pcp@xxxxxxxxxxx>
Delivered-to: pcp@xxxxxxxxxxx
In-reply-to: <404092777.4770722.1452032875540.JavaMail.zimbra@xxxxxxxxxx>
References: <805278639.3777112.1451891182627.JavaMail.zimbra@xxxxxxxxxx> <780203978.3777208.1451891272970.JavaMail.zimbra@xxxxxxxxxx> <y0mio37n8i3.fsf@xxxxxxxx> <404092777.4770722.1452032875540.JavaMail.zimbra@xxxxxxxxxx>
User-agent: Mutt/1.4.2.2i
Hi -


> > [...] it has perfectly safe & legimitate [sic] uses, [...]
> 
> I've not seen a realistic case for elevating remote privileges
> and circumventing the pmcd/DSO authentication model in this way,
> just for webapps. [...]

Here are two realistic cases, not of "circumvention" but of normal
simple use, so we all have seen them:

- A person starts a personal pmwebd daemon to monitor the system and
  her own processes with a webapp; she does not have sysadmin powers
  to set up sasl stuff for pmcd to use (which, remember, is far from
  out-of-the-box ATM); running "pmwebd -P" lets her own credentials
  pass through to pmcd without any complication

- A sysadmin wants to monitor performance counters via pmdapapi from a
  webapp, which limits itself to root-authenticated clients.  He
  starts up a custom pmwebd daemon, protects it with a firewall so
  only she can connect to it.  "pmwebd -P" lets him do it securely
  and without any other setup complication.

  (By the way, pcp-tcp style explicit authentication is not a security
  panacea; if unthrottled, it would allow remote attackers to scan the
  system user database, mass-testing userid/password combinations.
  pmcd with sasl setup would be even less suitable for direct exposure
  to hostile networks.)


- FChE

<Prev in Thread] Current Thread [Next in Thread>