Project

General

Profile

Actions

Feature #9733

open

Separate rbd listing into CAP

Added by Robert LeBlanc over 9 years ago. Updated over 9 years ago.

Status:
New
Priority:
Normal
Assignee:
-
Target version:
-
% Done:

0%

Source:
other
Tags:
Backport:
Reviewed:
Affected Versions:
Pull request ID:

Description

We are concerned that if the key is compromised in our OpenStack environment, then all images in the pool can be listed, exported, etc. Since OpenStack knows which images are in the Ceph pool, it should be able to request a mount of the appropriate image by name without needing the ability to list. By making rbd listing a cap that can be enabled/disabled, we can feel better that if the key were to be compromised it would add a first layer of defense. A person would not be able to easily list images and would have to guess at UUIDs to try operations on. I'm sure that the person could find the UUIDs of the VMs running on the local compromised host through ps/proc, but at least it would limit them to a much smaller percentage.

It would be similar to having only execute permissions on a directory in Linux. If you have rights to a file/folder underneath and know the name, you can operate on the file/folder.

Actions

Also available in: Atom PDF