Public bug reported:

Description
===========
I created an instance of the configuration driver in iso9660 format, and then 
logged in to the instance. I found that the permissions of the files and 
directories injected through the configuration driver were all 555. For 
example, 
ec2/2009-04-04/meta-data.json
ec2/2009-04-04/user-data
ec2/latest/meta-data.json
ec2/latest/user-data
openstack/2012-08-10/meta_data.json
openstack/2012-08-10/user_data
openstack/content
openstack/content/0000
openstack/content/0001
openstack/latest/meta_data.json
openstack/latest/user_data
If the data injected by the user contains sensitive information such as 
passwords and secret keys, and the file and directory permissions are not set 
appropriately, sensitive information may be leaked and security attacks may 
occur.

Steps to reproduce
==================
step1: I set config_drive_format=iso9660
step2: I created a flavor and image
step3: nova boot --image my_image --flavor my --nic net-name=config_net my_vm 
--config-drive true
step4: I logged in to the instance to view file and directory permissions

Expected result
===============
I would like to be able to set different file permissions based on different 
file types to meet security regulations. For example, the configuration 
directory is 750, the configuration file is 640, and the program files and 
directories are 550, etc.

Actual result
=============
The permissions of the files and directories injected through the configuration 
driver were all 555.

Environment
===========
1. version: nova 20.1.1
2. hypervisor:Libvirt + KVM
2. storage type: LVM
3. networking: Neutron with OpenVSwitch

** Affects: nova
     Importance: Undecided
         Status: New

** Summary changed:

- The file permissions injected into the virtual machine through Config Drive 
do not meet security requirements.
+ The file permissions injected into the virtual machine through Config Drive 
do not meet security regulations.

** Summary changed:

- The file permissions injected into the virtual machine through Config Drive 
do not meet security regulations.
+ The file permissions injected into the instance through Config Drive do not 
meet security regulations.

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/2083033

Title:
  The file permissions injected into the instance through Config Drive
  do not meet security regulations.

Status in OpenStack Compute (nova):
  New

Bug description:
  Description
  ===========
  I created an instance of the configuration driver in iso9660 format, and then 
logged in to the instance. I found that the permissions of the files and 
directories injected through the configuration driver were all 555. For 
example, 
  ec2/2009-04-04/meta-data.json
  ec2/2009-04-04/user-data
  ec2/latest/meta-data.json
  ec2/latest/user-data
  openstack/2012-08-10/meta_data.json
  openstack/2012-08-10/user_data
  openstack/content
  openstack/content/0000
  openstack/content/0001
  openstack/latest/meta_data.json
  openstack/latest/user_data
  If the data injected by the user contains sensitive information such as 
passwords and secret keys, and the file and directory permissions are not set 
appropriately, sensitive information may be leaked and security attacks may 
occur.

  Steps to reproduce
  ==================
  step1: I set config_drive_format=iso9660
  step2: I created a flavor and image
  step3: nova boot --image my_image --flavor my --nic net-name=config_net my_vm 
--config-drive true
  step4: I logged in to the instance to view file and directory permissions

  Expected result
  ===============
  I would like to be able to set different file permissions based on different 
file types to meet security regulations. For example, the configuration 
directory is 750, the configuration file is 640, and the program files and 
directories are 550, etc.

  Actual result
  =============
  The permissions of the files and directories injected through the 
configuration driver were all 555.

  Environment
  ===========
  1. version: nova 20.1.1
  2. hypervisor:Libvirt + KVM
  2. storage type: LVM
  3. networking: Neutron with OpenVSwitch

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/2083033/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to     : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp

Reply via email to