FS#43059 - [openssl] /etc/ssl/private has far too permissive permissions by default
Attached to Project:
Arch Linux
Opened by Patrick Goetz (pgoetz) - Tuesday, 09 December 2014, 22:01 GMT
Last edited by Buggy McBugFace (bugbot) - Saturday, 25 November 2023, 20:22 GMT
Opened by Patrick Goetz (pgoetz) - Tuesday, 09 December 2014, 22:01 GMT
Last edited by Buggy McBugFace (bugbot) - Saturday, 25 November 2023, 20:22 GMT
|
Details
Package: openssl 1.0.1.j-1
Description: The permissions on /etc/ssl/private are far too permissive by default: # cd /etc/ssl # ls -l private drwxr-xr-x 2 root root 4096 Sep 9 05:34 private This allows anyone with a login to get into the private key folder. If someone messes up the permissions on a key file, the key becomes publicly accessible. Suggestion: the debian configuration for this is pretty good. First, create an ssl-cert group: # grep ssl-cert /etc/group ssl-cert:x:113:postfix,cyrus Then set the permissions on /etc/ssl/private accordingly: # cd /etc/ssl # ls -ld private drwx--x--- 2 root ssl-cert 4096 Sep 9 05:34 private As illustrated above, services which need access to the private key store can then be added to the ssl-cert group. Of course the keys will also need to be owned by ssl-cert and group readable. |
This task depends upon
Closed by Buggy McBugFace (bugbot)
Saturday, 25 November 2023, 20:22 GMT
Reason for closing: Moved
Additional comments about closing: https://gitlab.archlinux.org/archlinux/p ackaging/packages/openssl/issues/1
Saturday, 25 November 2023, 20:22 GMT
Reason for closing: Moved
Additional comments about closing: https://gitlab.archlinux.org/archlinux/p ackaging/packages/openssl/issues/1
warning: directory permissions differ on /etc/ssl/private/
filesystem: 710 package: 755
warning: directory ownership differs on /etc/ssl/private/
filesystem: 0:113 package: 0:0
indicating that this issue hasn't been addressed yet. This is I think a very serious security issue with a very simple solution. What's the holdup in getting this addressed?
Patrick: If you are storing private keys for different users in the same directory, chances are high that your configuration is broken anyhow. The very concept of storing the private X.509 keys for different daemons/users in a single common directory seems terribly misguided (at least to me).
I think the approach debian choose with a ssl-cert group and according dir permissions for /etc/ssl/private are the way to go.