-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[defect]: Password is logged to world-readable log file on startup #5241
Comments
So? What's the problem? The default configuration has it that the log files are not world readable. This means that anyone who can read the log files can also read the configuration files... which also has the password. What exactly is the security issue here? What unprivileged user can read privileged information? |
Logs can be shipped, and it's common to ship logs out of a system, the privileges might not be the same as the system running freeradius. |
Configuration files can also be shipped off-machine. We're happy to accept a patch which fixes the issue. This is Open Source, and we rely on contributions from the community. Barring that, this is a low-priority issue. |
I think you misunderstood, logshipping is a common configuration for environments with a lot of servers, those logs are then sendt to eg. newrelic or an elasticsearch instance, where the ACL is different to accessing the system that runs freeradius, people who might need access to the log may not necessarily have access to the system. This would lead to a vector that doesn't require a breach of the system running freeradius. |
I think this is an issue if we've gone out of our way to obfuscate other config items with debug < 3. Just a manual hack here would be sufficient? Copy the parameter string to a buffer and elide everything from |
This is on v3, so there's no "secret" flag available. My point is really that it's a one-line patch to simply omit that message if necessary, or make it a debug message. I would much prefer a fix for something, rather than a bug report which says "I don't like this. In some situations in my network it causes issues, please fix it." |
I'll also add that the password field is in the output only for some databases. So simply hacking up the string for MySQL isn't a fix. |
I think it's just postgresql which uses a parameter string |
What type of defect/bug is this?
Unexpected behaviour (obvious or verified by project member)
How can the issue be reproduced?
When you use the rlm_sql connection, the password is logged to the log file on startup in info messages.
To reproduce, set up rlm_sql_postgresql with the following configuration in /etc/freeradius/mods-enabled/sql:
and
Log output from the FreeRADIUS daemon
Relevant log output from client utilities
No response
Backtrace from LLDB or GDB
No response
The text was updated successfully, but these errors were encountered: