Injecting the administrator password on Windows requires clarifications

Bug #1455110 reported by Alessandro Pilotti
8
This bug affects 1 person
Affects Status Importance Assigned to Milestone
openstack-manuals
Fix Released
Low
Unassigned

Bug Description

The following setting is linux only. The documentation already states that it works by updating directly the /etc/shadow file, but this is not explicit enough and users might think that by setting inject_password to True it will work on Windows instances as well.

[libvirt]
inject_password=true

The article should also specify that if the password is provided via nova CLI or Horizon (can_set_password = True), this will only be available in the metadata when a configdrive is used (admin_pass in meta_data.son).

The password is not included in the corresponding HTTP metadata (e.g. http://169.254.169.254/openstack/latest/meta_data.json).

Additionally, it should be clearly stated that clear text passwords are a security risk and that Nova provides a secure way to handle passwords with "nova get-password" since Grizzly.

-----------------------------------
Built: 2015-05-14T07:06:14 00:00
git SHA: c48b1257234e95a1e74f10bbe84318c4f63fdbed
URL: http://docs.openstack.org/admin-guide-cloud/content/admin-password-injection.html
source File: file:/home/jenkins/workspace/openstack-manuals-tox-doc-publishdocs/doc/admin-guide-cloud/compute/section_compute-system-admin.xml
xml:id: admin-password-injection

Tags: admin-guide
Changed in openstack-manuals:
status: New → Confirmed
importance: Undecided → Medium
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to openstack-manuals (master)

Fix proposed to branch: master
Review: https://review.openstack.org/183093

Changed in openstack-manuals:
assignee: nobody → Gauvain Pocentek (gpocentek)
status: Confirmed → In Progress
description: updated
description: updated
summary: - Injecting the administrator password on libvirt must specify that it's
- linux only
+ Injecting the administrator password on Windows requires clarifications
Tom Fifield (fifieldt)
Changed in openstack-manuals:
milestone: none → liberty
Changed in openstack-manuals:
assignee: Gauvain Pocentek (gpocentek) → nobody
status: In Progress → New
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Change abandoned on openstack-manuals (master)

Change abandoned by Gauvain Pocentek (<email address hidden>) on branch: master
Review: https://review.openstack.org/183093
Reason: I'm not sure I'll find time to work on this before a while, so I prefer to abandon this patchset.

I set the bug status to 'new', mmaybe it's worth discussing it on LP.

Revision history for this message
Lana (loquacity) wrote :

From Michael Still's comment on Guavain's patch: "we shouldn't be encouraging file injection at all -- nova has wanted to remove it for a long time. If users want this functionality we should be steering them to config drive or the metadata server. Incidentally, both of those two mechanisms work just fine on Windows."

Changed in openstack-manuals:
status: New → Confirmed
Revision history for this message
Atsushi SAKAI (sakaia) wrote :

Lana
Tom

  This issue seems that it should skip Libery cycle.
 Is this issue target still in Libery cycle?

Changed in openstack-manuals:
milestone: liberty → mitaka
Changed in openstack-manuals:
milestone: mitaka → newton
Changed in openstack-manuals:
milestone: newton → ocata
Changed in openstack-manuals:
milestone: ocata → none
tags: added: admin-guide
tags: added: nova
Changed in openstack-manuals:
importance: Medium → Low
tags: removed: nova
Revision history for this message
Alexandra Settle (alexandra-settle) wrote :
Changed in openstack-manuals:
status: Confirmed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.