[tor-bugs] #30023 [Internal Services/Tor Sysadmin Team]: improve grafana authentication
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon Apr 22 18:38:56 UTC 2019
#30023: improve grafana authentication
-------------------------------------------------+---------------------
Reporter: anarcat | Owner: tpa
Type: task | Status: new
Priority: Medium | Milestone:
Component: Internal Services/Tor Sysadmin Team | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------------------------------+---------------------
Comment (by anarcat):
> Okay, HTTPS + a stronger password to access the graphs sounds fine to
me right now. I think especially with our current policy of only exporting
a small amount of metrics we don't have much to risk at the moment.
So if I understand you right, the blocker for snowflake being integrated
in Prometheus monitoring is to make sure we have proper passwords to
protect the metrics. This currently means locking down the Prometheus web
interface itself which is protected only by a trivial password to keep the
bots away, and opening up Grafana to external authentication so that non-
TSA folks can access it.
In other words, right now we have the current situation:
* Prometheus: trivial password, easy to guess, access to raw metrics and
rough graphs possible for public
* Grafana: single, strong, shared admin password, only accessible to TPA,
full graphs and queries possible only for people with the shared password
The new situation would be:
* Prometheus: hard, strong, shared password only accessible to TPA for
debug purposes (or accessible only to localhost)
* Grafana: LDAP authentication or some other mechanism to grant people
outside TPA access to the server
There are two problems with this:
1. we're hesitant in setting LDAP authentication in Grafana, because we
don't want to have monitoring depend on LDAP to work but also because
we're hesitant in putting more stuff in LDAP in general (the less stuff
has access to it the better)
2. we might *want* to provide (semi-)public (with trivial password)
access to those graphs for transparency and ease-of-access reasons
What TPA is proposing now is to setup another server to monitor external
resources. It would solve problem 2 above, but not problem 1. It would
also conflate two distinct problems
* "external resources should not be monitored alongside internal
resources"
* "some metrics should stay private" problem
Because, of course, maybe some internal resources should stay private and
external resources should be public, and vice versa. I'm not sure how to
resolve this conendrum.
I don't have a clear view of what goes where, to be honest. There were a
few requests already for external monitoring and I must admit I somehow
have trouble keeping track of things. :) There are at least two concurrent
requests from the anti-censorship team, one of which was resolved
internally (#30006) so I hope you understand I can get a little
confused... It's also unclear to me what the endgame is with snowflake:
there was talk of migrating it inside TPO, for example...
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/30023#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list