-
Notifications
You must be signed in to change notification settings - Fork 5.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BUG] 3006.0 Debian and RPM salt-master package creates insecure permissions for salt user #64193
Comments
The fact that it doesn't match SEP19 is a huge red flag for SEP's. whats the point of asking for community SEP buy in if its not being built to agreed spec's. |
Can this be tested with 3006.1? |
@anilsil - 3006.1 doesn't resolve this. I'm going to re-integrate my changes in #64194 on top of 3006.1 as discussed here - #64174 (comment) |
Then it is all set for 3006.2 |
Thanks for the PR @barneysowood , let me know if you want help adding test coverage |
Thanks, will do. |
Waiting on PR #64194 to close this issue |
closed by #64194 |
Description
The release of 3006.0 included changes in the Debian and RPM packaging to create a user
salt
and config to run thesalt-master
processes under this user (#64045 and #64037).Whilst running the master as a non-root user is an improvement, the benefit is seriously compromised by giving the
salt
user ownership ofThe main issues being:
Write access to the python installation in
/opt/saltstack/salt
- thesalt-master
process should not be able to (persistently) modify the code it is running and more importantly, the code other salt processes (eg a local minion,salt-api
, etc) are running asroot
.Read/write access to configuration and private data of other salt processes (eg
salt-minion
)Setup
Install 3006.0 from Debian or RPM packages
Expected behavior
The
salt-master
process:/opt/saltstack/salt
Versions Report
Additional context
/opt/saltstack/salt
bysalt
user - it's not clear from [3006.x]User salt user/group for running salt-master #64037, but I suspect that this may have been done so that it is possible for thesalt-master
process to create bytecompiled python modules when it runs. It should be possible to create those at package install time and have them owned by root instead./opt/saltstack/salt
owned by root will mean that the MasterMinion won't be able to install python modules. I think that's a corner case/anti-feature, the default should be that thesalt-master
cannot modify the salt install and if users need to do that they can choose to modify ownership locally or run the master as root.salt-master
to be able to write to anything other than/etc/salt/pki/master
and/etc/salt/master.d
under/etc/salt
.salt-master
process to read any configs for other salt commands/daemons from/etc/salt
, but it looks like it may currently need to read the minion config (see [BUG] 3006 Inconsistency with minion and master permissions on /etc/salt #64158)The text was updated successfully, but these errors were encountered: