Pillar leakage risk and desync issue #14

Closed
opened 2022-09-08 16:32:01 -05:00 by ejparker · 1 comment
Owner

Similar to #13, the reliance grains for determining roles creates a leakage risk if an attacker gains access to a minion and is able to modify the grains file. For pillars, the data at risk (currently) isn't anything that needs to be secured, so the threat is very low at the moment.

The bigger problem is that relying on pillar data for roles in state files but grain data for roles in pillars creates desync issues, which can/will cause problems when deploying new servers. Unfortunately since pillars files can't directly reference pillar data (for obvious reasons), an alternative means of pulling in role data from pillar files is needed.

Similar to #13, the reliance grains for determining roles creates a leakage risk if an attacker gains access to a minion and is able to modify the grains file. For pillars, the data at risk (currently) isn't anything that needs to be secured, so the threat is very low at the moment. The bigger problem is that relying on pillar data for roles in state files but grain data for roles in pillars creates desync issues, which can/will cause problems when deploying new servers. Unfortunately since pillars files can't directly reference pillar data (for obvious reasons), an alternative means of pulling in role data from pillar files is needed.
Author
Owner

fixed with 256d75bc6b

fixed with 256d75bc6b
Sign in to join this conversation.
No labels
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: actcur/salt#14
No description provided.