You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@cloudstack.apache.org by "Demetrius Tsitrelis (JIRA)" <ji...@apache.org> on 2013/04/18 22:50:13 UTC
[jira] [Assigned] (CLOUDSTACK-243) On management server, security
for remote JMX connections is disabled
[ https://issues.apache.org/jira/browse/CLOUDSTACK-243?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Demetrius Tsitrelis reassigned CLOUDSTACK-243:
----------------------------------------------
Assignee: John Kinsella
> On management server, security for remote JMX connections is disabled
> ---------------------------------------------------------------------
>
> Key: CLOUDSTACK-243
> URL: https://issues.apache.org/jira/browse/CLOUDSTACK-243
> Project: CloudStack
> Issue Type: Bug
> Security Level: Public(Anyone can view this level - this is the default.)
> Components: Install and Setup
> Affects Versions: 4.0.0
> Reporter: Clement Chen
> Assignee: John Kinsella
> Labels: security
> Fix For: 4.1.0
>
>
> Reference: The JMX Monitoring and Management configuration options are listed at http://docs.oracle.com/javase/6/docs/technotes/guides/management/agent.html
> The default option values are to allow local connections and, if a remote port is later specified, to require password-based authentication and to enable SSL.
> CloudStack starts Tomcat (see client/tomcatconf/tomcat6-ssl.conf.in) to enable remote connections AND it explicitly disables all security on that connection:
> javax.net.ssl.trustStore=/etc/cloud/management/cloudmanagementserver.keystore
> javax.net.ssl.trustStorePassword=vmops.com
> com.sun.management.jmxremote.port=45219
> com.sun.management.jmxremote.authenticate=false
> com.sun.management.jmxremote.ssl=false
> Thus remote JMX connections are allowed to the management server without any authentication. Further, SSL has also been disabled, so even if passwords were permitted they would be transported unencrypted.
> Disabling the default security leaves CloudStack vulnerable to attackers who can use the JMX APIs/JConsole, etc. to monitor the system or make changes to it through the various MBeans it exposes.
> CVSS: (AV:N/AC:M/Au:N/C:P/I:P/A:N), score 5.8
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira