Bug 133502
Summary: | up2date doesn't seem to validate RootCA of custom yum repository over https | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 3 | Reporter: | Chris Stankaitis <cstankaitis> |
Component: | up2date | Assignee: | Bret McMillan <bretm> |
Status: | CLOSED WONTFIX | QA Contact: | Fanny Augustin <fmoquete> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 3.0 | Keywords: | FutureFeature |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Enhancement | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2007-10-19 19:17:43 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Chris Stankaitis
2004-09-24 15:20:54 UTC
Almost a month with no comment from RH, can I please get an update? 2 month no comments. this is a potential security issue as it would appear that there is no validation of the RootCA CA certs are only verified for rhn repos (aka, default configs). Any other repos use http or unverified https. escalating this bug as a security concern, with up2date running unverified https it opens repo's up to being hijacked and having arbatraty/malicious packages installed on users machines. I can list many scenarios where this can be exploited under the right circumstances. please correct this issue and add rootCA verification for up2date to ensure the validity of the SSL connection for Repo's other then RHN. I'm removing the security severity on this issue. Trusting up2date to verify a connection is not secure. The reason package are GPG signed is to ensure that no matter the transport layer, the package is from who you think it's from. If you place complete trust in your yum repository, even though you have a valid SSL cert, the server could be compromised and malicious packages placed on it. Trusting the GPG package signatures ensures this is not a problem. This is not an issue for me, we do GPG sign all our RPM's but I would worry a lot of people out there with custom repo's would not be going to the same length using GPG, and configuring up2date to use the --nosig option(the UseGPG option in up2date --configure) and ignore GPG trusting in SSL which they might believe is validated. It's inconsistant behaviour, up2date will validate the RHN Cert and refuse to work if it can not validate that cert, one would presume (incorrectly) that if it validates the RHN cert that ssl cert validation would be a default behaviour for the program. I'll switch this to an RFE, I still consider this issue something which should be looked into. This bug is filed against RHEL 3, which is in maintenance phase. During the maintenance phase, only security errata and select mission critical bug fixes will be released for enterprise products. Since this bug does not meet that criteria, it is now being closed. For more information of the RHEL errata support policy, please visit: http://www.redhat.com/security/updates/errata/ If you feel this bug is indeed mission critical, please contact your support representative. You may be asked to provide detailed information on how this bug is affecting you. |