mirror of
https://github.com/amidaware/tacticalrmm.git
synced 2026-04-26 23:15:57 +03:00
[GH-ISSUE #1307] Insecure permissions for /etc/letsencrypt #2755
Labels
No labels
In Process
bug
bug
dev-triage
documentation
duplicate
enhancement
fixed
good first issue
help wanted
integration
invalid
pull-request
question
requires agent update
security
ui tweak
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/tacticalrmm#2755
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @NiceGuyIT on GitHub (Oct 9, 2022).
Original GitHub issue: https://github.com/amidaware/tacticalrmm/issues/1307
Originally assigned to: @wh1te909 on GitHub.
Server Info (please complete the following information):
Installation Method:
Agent Info (please complete the following information):
Describe the bug
Line 171 of the install.sh script changes permissions of
/etc/letsencryptto allow everyone read access to the rmm/api/mesh certs and key PEM files. Anyone that has access to the TRMM server has access to the certs. This is insecure.The update.sh has the same command.
To Reproduce
Steps to reproduce the behavior:
cd /etc/letsencrypt/keysls -lao=rxpermissions.Expected behavior
The TLS keys should be readable only by the necessary processes. They should never be world readable.
Screenshots
N/A
Additional context
I'm reporting here because an attacker would need to gain access to the server and redirect DNS. This is extremely unlikely.
@NiceGuyIT commented on GitHub (Oct 9, 2022):
For reference, here's the permissions after deleting
/etc/letsencryptand runningcertbot.@wh1te909 commented on GitHub (Oct 14, 2022):
thanks! I removed the
chmodcommand not even sure why that was there lol...the perms don't need touching the defaults are good.