Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#43059 - [openssl] /etc/ssl/private has far too permissive permissions by default
Attached to Project:
Arch Linux
Opened by Patrick Goetz (pgoetz) - Tuesday, 09 December 2014, 22:01 GMT
Last edited by Evangelos Foutras (foutrelis) - Tuesday, 12 April 2022, 04:11 GMT
Opened by Patrick Goetz (pgoetz) - Tuesday, 09 December 2014, 22:01 GMT
Last edited by Evangelos Foutras (foutrelis) - Tuesday, 12 April 2022, 04:11 GMT
|
DetailsPackage: openssl 1.0.1.j-1
Description: The permissions on /etc/ssl/private are far too permissive by default: # cd /etc/ssl # ls -l private drwxr-xr-x 2 root root 4096 Sep 9 05:34 private This allows anyone with a login to get into the private key folder. If someone messes up the permissions on a key file, the key becomes publicly accessible. Suggestion: the debian configuration for this is pretty good. First, create an ssl-cert group: # grep ssl-cert /etc/group ssl-cert:x:113:postfix,cyrus Then set the permissions on /etc/ssl/private accordingly: # cd /etc/ssl # ls -ld private drwx--x--- 2 root ssl-cert 4096 Sep 9 05:34 private As illustrated above, services which need access to the private key store can then be added to the ssl-cert group. Of course the keys will also need to be owned by ssl-cert and group readable. |
This task depends upon
warning: directory permissions differ on /etc/ssl/private/
filesystem: 710 package: 755
warning: directory ownership differs on /etc/ssl/private/
filesystem: 0:113 package: 0:0
indicating that this issue hasn't been addressed yet. This is I think a very serious security issue with a very simple solution. What's the holdup in getting this addressed?
Patrick: If you are storing private keys for different users in the same directory, chances are high that your configuration is broken anyhow. The very concept of storing the private X.509 keys for different daemons/users in a single common directory seems terribly misguided (at least to me).
I think the approach debian choose with a ssl-cert group and according dir permissions for /etc/ssl/private are the way to go.