VMware: avoid vCenter plaintext passwords in nova.conf

Registered by Shawn Hartsock

The primary concern is that vCenter usernames and passwords are stored in plain text inside the nova.conf file.

The proposed solution is to give a user the capability to put the vCenter user and password in the keystone credential store instead of nova.conf. The keystone credential store database access is secured through use of the nova user and password.

The vmware driver would first check the 'vmware' section of the nova.conf for the host_ip, host_username, and host_password. Only in the case where host_username and/or host_password are not found in nova.conf, does the driver contact keystone to search for an appropriate credential.

Part of this conversation: https://etherpad.openstack.org/p/vmware_security_strategy

Blueprint information

Status:
Started
Approver:
None
Priority:
Undefined
Drafter:
Shawn Hartsock
Direction:
Needs approval
Assignee:
Eric Brown
Definition:
Pending Approval
Series goal:
Proposed for ocata
Implementation:
Needs Code Review
Milestone target:
None
Started by
Shawn Hartsock

Related branches

Sprints

Whiteboard

IBM has something internally that we've been using since Grizzly that I think might be the same as your quick and dirty solution for Icehouse until something better can be fleshed out long-term with keystone, barbican, and/or password keyrings in oslo-incubator. I'll work on pushing an oslo.config WIP patch for that to get you an idea if it's something that has legs. I've been looking to move this code upstream for awhile now, just never had the right vehicle. -- mriedem

The scope of this blueprint appears to be encrypted passwords in nova.conf, but the review that's posted goes in a different direction. And according to the linked etherpad the nova.conf solution is relying upon changes to oslo.config in which case this should be set as a dependent blueprint of something in oslo. --alaski

Plan is to modify the Nova vmware driver to look up its necessary user/pwd in the keystone credential store. It would only do so if the host_username or host_password options were not specified in the nova.conf. The host_ip would always need to be specified. Its an optional solution that enables a customer to avoid the vcenter password in the nova.conf.

It does not attempt to address all other passwords that could be in any of the services' conf files (the oslo based solution). I've been told barbican can potentially help to address that.

Documented this design in the blueprint's etherpad under A.5. And I've already created a patch (https://review.openstack.org/#/c/70836/), that does work, but requires more changes. I'm looking to get this included in icehouse-3. -- browne

Since this is going in a different direction than the title and description above would indicate, could you update the blueprint to match the new direction. I think the current direction is fine, but I would like the scope of the blueprint to be accurately represented to help reviewers out. --alaski

deferred from icehouse-3 to "next": http://lists.openstack.org/pipermail/openstack-dev/2014-February/026335.html

Gerrit topic: https://review.openstack.org/#q,topic:bp/vmware-encrypt-vcenter-passwords,n,z

Addressed by: https://review.openstack.org/70836
    VMware: Store vCenter passwords in keystone credential store

Removed from next, as next is now reserved for near misses from the last milestone --johnthetubaguyIBM has something internally that we've been using since Grizzly that I think might be the same as your quick and dirty solution for Icehouse until something better can be fleshed out long-term with keystone, barbican, and/or password keyrings in oslo-incubator. I'll work on pushing an oslo.config WIP patch for that to get you an idea if it's something that has legs. I've been looking to move this code upstream for awhile now, just never had the right vehicle. -- mriedem

The scope of this blueprint appears to be encrypted passwords in nova.conf, but the review that's posted goes in a different direction. And according to the linked etherpad the nova.conf solution is relying upon changes to oslo.config in which case this should be set as a dependent blueprint of something in oslo. --alaski

Plan is to modify the Nova vmware driver to look up its necessary user/pwd in the keystone credential store. It would only do so if the host_username or host_password options were not specified in the nova.conf. The host_ip would always need to be specified. Its an optional solution that enables a customer to avoid the vcenter password in the nova.conf.

It does not attempt to address all other passwords that could be in any of the services' conf files (the oslo based solution). I've been told barbican can potentially help to address that.

Documented this design in the blueprint's etherpad under A.5. And I've already created a patch (https://review.openstack.org/#/c/70836/), that does work, but requires more changes. I'm looking to get this included in icehouse-3. -- browne

Since this is going in a different direction than the title and description above would indicate, could you update the blueprint to match the new direction. I think the current direction is fine, but I would like the scope of the blueprint to be accurately represented to help reviewers out. --alaski

deferred from icehouse-3 to "next": http://lists.openstack.org/pipermail/openstack-dev/2014-February/026335.html

Gerrit topic: https://review.openstack.org/#q,topic:bp/vmware-encrypt-vcenter-passwords,n,z

Addressed by: https://review.openstack.org/70836
    VMware: Store vCenter passwords in keystone credential store

Removed from next, as next is now reserved for near misses from the last milestone --johnthetubaguy

Marking this blueprint as definition: Drafting. If you are still working on this, please re-submit via nova-specs. If not, please mark as obsolete, and add a quick comment to describe why. --johnthetubaguy (20th April 2014)

Gerrit topic: https://review.openstack.org/#q,topic:bp/proposes,n,z

Addressed by: https://review.openstack.org/85510
    VMware: Store vCenter passwords in keystone credential store

No spec submition linked here, please submit a spec and consider this for juno-2, un-targeting blueprint from juno-1 --johnthetubaguy (28th May 2014)

Addressed by: https://review.openstack.org/234480
    VMware: store vCenter user/password in Keystone

(?)

Work Items

Dependency tree

* Blueprints in grey have been implemented.

This blueprint contains Public information 
Everyone can see this information.