Bug 133502

Summary: up2date doesn't seem to validate RootCA of custom yum repository over https
Product: Red Hat Enterprise Linux 3 Reporter: Chris Stankaitis <cstankaitis>
Component: up2dateAssignee: Bret McMillan <bretm>
Status: CLOSED WONTFIX QA Contact: Fanny Augustin <fmoquete>
Severity: medium Docs Contact:
Priority: medium    
Version: 3.0Keywords: FutureFeature
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Enhancement
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2007-10-19 19:17:43 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Chris Stankaitis 2004-09-24 15:20:54 UTC
Description of problem:

I created a custom yum repository, to keep things secure I am running
it over SSL using a signed cert from our Company Root-CA.  On box I
have added the repository to the /etc/sysconfig/rhn/sources and the
Root CA to the /usr/share/rhn/RHNS-CA-CERT and all seemed good. I
tested up2date on a box where I had NOT added the rootca to the
/usr/share/rhn/RHNS-CA-CERT file and it also worked with no visible
erros to screen or to logs about it being unable to validate the cert
on my https reopsitory.

Version-Release number of selected component (if applicable):

up2date-4.2.38-1

How reproducible:

Always

Steps to Reproduce:
1. add repository yum dw-custom https://URL-TO-REPO to rhn/sources
2. do NOT add RootCA to RHNS-CA-CERT
3. up2date -l; up2date -u pkgname
  
Actual results:

up2date pulls headers/installs packages without complaining that it
cannot verify the SSL cert

Expected results:

some error to screen/log that it can not verify the SSL Cert due to a
missing CA and then exit

Comment 1 Chris Stankaitis 2004-10-20 16:45:51 UTC
Almost a month with no comment from RH, can I please get an update?

Comment 2 Chris Stankaitis 2004-12-02 17:37:20 UTC
2 month no comments. this is a potential security issue as it would
appear that there is no validation of the RootCA

Comment 3 Adrian Likins 2004-12-02 22:09:37 UTC
CA certs are only verified for rhn repos (aka, default
configs). Any other repos use http or unverified https. 


Comment 4 Chris Stankaitis 2004-12-06 20:48:27 UTC
escalating this bug as a security concern, with up2date running
unverified https it opens repo's up to being hijacked and having
arbatraty/malicious packages installed on users machines.

I can list many scenarios where this can be exploited under the right
circumstances.

please correct this issue and add rootCA verification for up2date to
ensure the validity of the SSL connection for Repo's other then RHN.


Comment 5 Josh Bressers 2004-12-07 21:01:32 UTC
I'm removing the security severity on this issue.  Trusting up2date to
verify a connection is not secure.  The reason package are GPG signed
is to ensure that no matter the transport layer, the package is from
who you think it's from.

If you place complete trust in your yum repository, even though you
have a valid SSL cert, the server could be compromised and malicious
packages placed on it.  Trusting the GPG package signatures ensures
this is not a problem.

Comment 6 Chris Stankaitis 2004-12-07 21:20:58 UTC
This is not an issue for me, we do GPG sign all our RPM's but I would
worry a lot of people out there with custom repo's would not be going
to the same length using GPG, and configuring up2date to use the
--nosig option(the UseGPG option in up2date --configure) and ignore
GPG trusting in SSL which they might believe is validated.  

It's inconsistant behaviour, up2date will validate the RHN Cert and
refuse to work if it can not validate that cert, one would presume
(incorrectly) that if it validates the RHN cert that ssl cert
validation would be a default behaviour for the program.

I'll switch this to an RFE, I still consider this issue something
which should be looked into.

Comment 7 RHEL Program Management 2007-10-19 19:17:43 UTC
This bug is filed against RHEL 3, which is in maintenance phase.
During the maintenance phase, only security errata and select mission
critical bug fixes will be released for enterprise products. Since
this bug does not meet that criteria, it is now being closed.
 
For more information of the RHEL errata support policy, please visit:
http://www.redhat.com/security/updates/errata/
 
If you feel this bug is indeed mission critical, please contact your
support representative. You may be asked to provide detailed
information on how this bug is affecting you.