On 11/8/21 2:04 PM, Stephen Frost wrote:
* David Steele (da...@pgmasters.net) wrote:

I looked at trying to make this code common between the server and client
but due to the differences in error reporting it seemed like more trouble
than it was worth.

Maybe we should at least have the comments refer to each other though,
to hopefully encourage future hackers in this area to maintain
consistency between the two and avoid what happened before..?

Done.

+
+               /*
+               * Refuse to load key files owned by users other than us or root.
+               *
+               * XXX surely we can check this on Windows somehow, too.
+               */

Not really sure if there's actually much point in having this marked in
this way as it's not apparently something we're going to actually fix in
the near term.  Maybe instead something like "Would be nice to find a
way to do this on Windows somehow, too, but it isn't clear today how
to."

Done.

+               /*
+               * Require no public access to key file. If the file is owned by 
us,
+               * require mode 0600 or less. If owned by root, require 0640 or 
less to
+               * allow read access through our gid, or a supplementary gid 
that allows
+               * to read system-wide certificates.
+               *
+               * XXX temporarily suppress check when on Windows, because there 
may not
+               * be proper support for Unix-y file permissions.  Need to think 
of a
+               * reasonable check to apply on Windows.
+               */

On the server-side, we also include a reference to postmaster.c.  Not
sure if we need to do that or not but just figured I'd mention it.

Looks like this moved to miscinit.c so probably this comment deserves an update. That might be better as a separate commit.

In the patch I referenced the function name instead since that will come up in searches when the original function gets renamed/moved.

  #ifndef WIN32
-               if (!S_ISREG(buf.st_mode) || buf.st_mode & (S_IRWXG | S_IRWXO))
+               if ((buf.st_uid == geteuid() && buf.st_mode & (S_IRWXG | 
S_IRWXO)) ||
+                       (buf.st_uid == 0 && buf.st_mode & (S_IWGRP | S_IXGRP | 
S_IRWXO)))
                {
                        appendPQExpBuffer(&conn->errorMessage,
-                                                         libpq_gettext("private key file 
\"%s\" has group or world access; permissions should be u=rw (0600) or less\n"),
+                                                         libpq_gettext("private key file 
\"%s\" has group or world access; file must have permissions u=rw (0600) or less if owned 
by the current user, or permissions u=rw,g=r (0640) or less if owned by root.\n"),
                                                          fnbuf);
                        return -1;
                }

Do we really want to remove the S_ISREG() check?  We have that check
(although a bit earlier) on the server side and we've had it for a very
long time, so I don't think that we want to drop it, certainly not
without some additional discussion as to why we should (and why it would
make sense to have that be different between the client side and the
server side).

Oof. Definitely a copy-paste error.

A new version is attached with these changes, plus I consolidated the checks under one comment block to reduce comment and #ifdef duplication.

We may want to do the same on the server side to make the code blocks look more similar.

Also, on the server side the S_ISREG() check gets its own error and that might be a good idea on the client side as well. As it is, the error message on the client is going to be pretty confusing in this case.

Regards,
--
-David
da...@pgmasters.net
diff --git a/src/backend/libpq/be-secure-common.c 
b/src/backend/libpq/be-secure-common.c
index a212308666..c6e4329653 100644
--- a/src/backend/libpq/be-secure-common.c
+++ b/src/backend/libpq/be-secure-common.c
@@ -155,6 +155,9 @@ check_ssl_key_file_permissions(const char *ssl_key_file, 
bool isServerStart)
        /*
         * Refuse to load key files owned by users other than us or root.
         *
+        * Note that a similar check is performed in initialize_SSL() so any 
changes
+        * here may need to be made there as well.
+        *
         * XXX surely we can check this on Windows somehow, too.
         */
 #if !defined(WIN32) && !defined(__CYGWIN__)
@@ -174,6 +177,9 @@ check_ssl_key_file_permissions(const char *ssl_key_file, 
bool isServerStart)
         * allow read access through our gid, or a supplementary gid that allows
         * to read system-wide certificates.
         *
+        * Note that a similar check is performed in initialize_SSL() so any 
changes
+        * here may need to be made there as well.
+        *
         * XXX temporarily suppress check when on Windows, because there may not
         * be proper support for Unix-y file permissions.  Need to think of a
         * reasonable check to apply on Windows.  (See also the data directory
diff --git a/src/interfaces/libpq/fe-secure-openssl.c 
b/src/interfaces/libpq/fe-secure-openssl.c
index a90d891c6c..d581ff6ca5 100644
--- a/src/interfaces/libpq/fe-secure-openssl.c
+++ b/src/interfaces/libpq/fe-secure-openssl.c
@@ -1240,11 +1240,37 @@ initialize_SSL(PGconn *conn)
                                                          fnbuf);
                        return -1;
                }
+
+               /*
+               * Refuse to load key files owned by users other than us or root 
and
+               * require no public access to the key file. If the file is 
owned by us,
+               * require mode 0600 or less. If owned by root, require 0640 or 
less to
+               * allow read access through our gid, or a supplementary gid 
that allows
+               * us to read system-wide certificates.
+               *
+               * Note that similar checks are performed in
+               * check_ssl_key_file_permissions() so any changes here may need 
to be
+               * made there as well.
+               *
+               * Ideally we would do similar checks on Windows but it is not 
clear how
+               * that would work since unix-style permissions may not be 
available. See
+               * also the data directory permissions checks in checkDataDir().
+               */
 #ifndef WIN32
-               if (!S_ISREG(buf.st_mode) || buf.st_mode & (S_IRWXG | S_IRWXO))
+               if (buf.st_uid != geteuid() && buf.st_uid != 0)
+               {
+                       appendPQExpBuffer(&conn->errorMessage,
+                                                         
libpq_gettext("private key file \"%s\" must be owned by the current user or 
root\n"),
+                                                         fnbuf);
+                       return -1;
+               }
+
+               if (!S_ISREG(buf.st_mode) ||
+                       (buf.st_uid == geteuid() && buf.st_mode & (S_IRWXG | 
S_IRWXO)) ||
+                       (buf.st_uid == 0 && buf.st_mode & (S_IWGRP | S_IXGRP | 
S_IRWXO)))
                {
                        appendPQExpBuffer(&conn->errorMessage,
-                                                         
libpq_gettext("private key file \"%s\" has group or world access; permissions 
should be u=rw (0600) or less\n"),
+                                                         
libpq_gettext("private key file \"%s\" has group or world access; file must 
have permissions u=rw (0600) or less if owned by the current user, or 
permissions u=rw,g=r (0640) or less if owned by root.\n"),
                                                          fnbuf);
                        return -1;
                }

Reply via email to