[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Xen-users] Re: XCP: Insecure Distro ?

The dom0 portion of a XCP appliance is not designed to operate as a standard multi user Unix SSH host.  The only way you can access the dom0 at all is if you already have the root password.  There are no other users in the dom0, so there is no reason to worry about file permissions within the dom0 in the same manor that you typically would in a multi user host.  The only way you can steal the passwd file is if you already know the root password.  That is already secure enough.


-----Original Message-----
From: xen-users-bounces@xxxxxxxxxxxxxxxxxxx [mailto:xen-users-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of A Cold Penguin
Sent: Tuesday, May 10, 2011 3:46 PM
To: xen-users@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-users] Re: XCP: Insecure Distro ?


>Sorry I wasn't completely clear.
>The reason why the use of /etc/passwd vs /etc/shadow is
>non-consequential is that XCP is a single user machine where all
>access is via UID 0.
>As such UNIX file permissions are effectively useless. For all intents
>and purposes 700 = 777 if you are always root and everything is owned
>by root yes?
>Does this further clarify why changing to /etc/shadow would be of no

No, if anything, it makes even less sense. If all the daemons are running as root, then the excuse that was put forward, that using shadow would stop the necessary daemons from being able to perform their synchronisation properly, is moot.
In the situation I am talking about here, root is often not used as a super-user. Although it would be understood that in the requirement of XCP this might be bypassed, the easy-access by keeping the password in a world-readable file would not be acceptable.
Xen-users mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.