Some files with sensitive information can be read by normal users #4

Closed
opened 2021-08-11 20:05:52 +00:00 by a · 11 comments
Owner

For example, /etc/synapse/homeserver.yaml is world readable and contains important passwords in plaintext. Please report here any other such files if you find them.

For example, `/etc/synapse/homeserver.yaml` is world readable and contains important passwords in plaintext. Please report here any other such files if you find them.
a added the
help wanted
label 2021-08-11 20:05:52 +00:00
a added this to the (deleted) project 2021-08-12 22:00:34 +00:00
Author
Owner

The Synapse config file is fixed now. Please report any other files with sensitive information if you find them!

The Synapse config file is fixed now. Please report any other files with sensitive information if you find them!
a added the
security
label 2021-08-15 15:14:26 +00:00
a added this to the v5.0 milestone 2021-10-31 15:17:30 +00:00
Author
Owner

I found two more after setting up Drone #12: /etc/systemd/system/drone.service.d/override.conf and /etc/systemd/system/drone-runner-exec.service.d/override.conf. Unfortunately, systemctl show will reveal the contents even if the files aren't world-readable, but we can use a EnvironmentFile instead in the systemd service file.

I found two more after setting up Drone #12: `/etc/systemd/system/drone.service.d/override.conf` and `/etc/systemd/system/drone-runner-exec.service.d/override.conf`. Unfortunately, `systemctl show` will reveal the contents even if the files aren't world-readable, but we can use a `EnvironmentFile` instead in the `systemd` service file.
a removed this from the v5.0 milestone 2021-11-03 00:39:13 +00:00
Author
Owner

Closing for now since I think we found and fixed all of world-readable files with sensitive contents. If you all find any more, just reopen this issue.

Closing for now since I think we found and fixed all of world-readable files with sensitive contents. If you all find any more, just reopen this issue.
a closed this issue 2021-11-13 03:39:49 +00:00
Author
Owner

Might want to check if any of the log files such as /var/log/nginx are readable or contain sensitive information.

Might want to check if any of the log files such as `/var/log/nginx` are readable or contain sensitive information.
a reopened this issue 2021-12-05 18:32:45 +00:00
Author
Owner

Restricted permissions on the /var/lib/mastodon, /var/lib/peertube, and /var/log/nginx folders.

Restricted permissions on the `/var/lib/mastodon`, `/var/lib/peertube`, and `/var/log/nginx` folders.
Author
Owner

Did the same with /etc/redis/redis.conf. How did we not catch that one?

Did the same with `/etc/redis/redis.conf`. How did we not catch that one?
a closed this issue 2021-12-16 14:13:13 +00:00
Author
Owner

Let's leave /var/lib/mastodon and /var/lib/peertube as 755 to prevent permissions issues.

Let's leave `/var/lib/mastodon` and `/var/lib/peertube` as `755` to prevent permissions issues.
Author
Owner

Fixed permissions on the /etc/peertube directory.

Fixed permissions on the `/etc/peertube` directory.
a reopened this issue 2022-01-06 01:11:59 +00:00
abheekd was assigned by a 2022-01-06 01:12:06 +00:00
Author
Owner

OK, so I ended up using 750 permissions on most sensitive folders in /var/lib and added the http user (for the web server) to some groups to get access to those folders.

OK, so I ended up using `750` permissions on most sensitive folders in `/var/lib` and added the `http` user (for the web server) to some groups to get access to those folders.
Author
Owner

I don't think this issue is as problematic anymore, since we no longer use password authentication for Redis or PostgreSQl and use Unix sockets instead. That's like 15 fewer passwords to worry about.

I don't think this issue is as problematic anymore, since we no longer use password authentication for Redis or PostgreSQl and use Unix sockets instead. That's like 15 fewer passwords to worry about.
Author
Owner

Closing since I think we fixed all of these files.

Closing since I think we fixed all of these files.
a closed this issue 2022-01-18 17:44:49 +00:00
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: exozyme/exozyme#4
No description provided.