Bug 1035204 - [ovirt-engine-backend] ovirt-engine public SSH keys stays on host after removal
Summary: [ovirt-engine-backend] ovirt-engine public SSH keys stays on host after removal
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Enterprise Virtualization Manager
Classification: Red Hat
Component: Documentation
Version: unspecified
Hardware: Unspecified
OS: Unspecified
unspecified
medium
Target Milestone: ---
: 3.4.0
Assignee: Zac Dover
QA Contact: ecs-bugs
URL:
Whiteboard: infra
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-11-27 09:44 UTC by Jiri Belka
Modified: 2016-02-10 19:08 UTC (History)
8 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-04-05 06:24:32 UTC
oVirt Team: Infra
Target Upstream Version:


Attachments (Terms of Use)

Description Jiri Belka 2013-11-27 09:44:40 UTC
Description of problem:
ovirt-engine public SSH keys stays on host after removal. not sure if this is what we want.

Version-Release number of selected component (if applicable):
is24.2

How reproducible:
100%

Steps to Reproduce:
1. add host with password
2. hosts -> maintainance
3. remove host

Actual results:
ovirt-engine public ssh keys stays on the host

Expected results:
not sure

Additional info:

Comment 1 Alon Bar-Lev 2013-11-28 12:46:51 UTC
There is no active operation on host when host is removed, hence no removal of any resource.

The public key can be used for future add host using public key.

I tend to close it as NOTABUG.

Comment 2 Jiri Belka 2013-11-28 12:58:48 UTC
What about documenting somewhere that while a host is added into setup public SSH keys of engine installation is place on the host and not removed? Getting private key from /etc/pki/ovirt-engine/keys/engine_id_rsa means access to hosts removed from RHEVM setup.

Comment 3 Alon Bar-Lev 2013-11-28 13:00:50 UTC
(In reply to Jiri Belka from comment #2)
> What about documenting somewhere that while a host is added into setup
> public SSH keys of engine installation is place on the host and not removed?
> Getting private key from /etc/pki/ovirt-engine/keys/engine_id_rsa means
> access to hosts removed from RHEVM setup.

I do not mind documenting anything, can you please move this into doc bug?

BTW: it was always the case since [at least] 3.0.

Comment 4 Alon Bar-Lev 2013-11-28 13:03:38 UTC
Hmmm.... just some more information...

vdsm stays up... engine can keep communicate with it post remove if so it wishes.

So under the same logic, vdsm should be removed as well, or at least keys removed.

This regardless if we install some back door...

What I mean is that once host is added to some provisioning framework with root credentials, it is a total slave and cannot be trusted even if removed.

Comment 5 Jiri Belka 2013-11-28 13:11:16 UTC
So... RHEVM should learn how to do cleaning (no access without confirmation, no RHEVM services running...). And... if something cannot be cleaned up, then it should be documented, what kind of "backdoors" are kept there...

Comment 6 Jiri Belka 2013-11-28 13:12:46 UTC
RHEL management of services is not so stupid as on Debian, they are 'off' by default. So vdsm related services should be put 'off' again.

Comment 7 Zac Dover 2014-04-05 06:24:32 UTC
The RHEV 3.4 docs development cycle has only one week remaining, and all features that are not substantially in their final form can not be documented given the resources that we have. I agree that people should know that public SSH keys stay on host after the host has been removed from the RHEVM environment, but this unclean key treatment sounds like a bug to me and ECS has a policy of not documenting bugs. I will set this to CLOSED WONTFIX, and will return to examine this issue during the 3.5 planning.


Note You need to log in before you can comment on or make changes to this bug.