Bug 171163

Summary: CUPS trashes permissions on SSL certificates
Product: Red Hat Enterprise Linux 4 Reporter: Josh Kelley <joshkel>
Component: cupsAssignee: Tim Waugh <twaugh>
Status: CLOSED DEFERRED QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: 4.0   
Target Milestone: ---   
Target Release: ---   
Hardware: i386   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2005-11-08 16:05:22 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Josh Kelley 2005-10-18 21:28:43 UTC
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.12) Gecko/20050922 Fedora/1.0.7-1.1.fc4 Firefox/1.0.7

Description of problem:
When the cups service is started, it changes the permissions on its certificate file and certificate key file to mode 0640, owner root:sys.  This is bad for two reasons.  First, as far as I know, the certificate file can and often should be world-readable.  Second, if other services are configured to use the same certificate and key files, they may stop working.  For example, OpenLDAP requires that the key be readable by the ldap user.

Version-Release number of selected component (if applicable):
cups-1.1.22-0.rc1.9.8

How reproducible:
Always

Steps to Reproduce:
1. Edit /etc/cups/cupsd.conf and configure a ServerCertificate and ServerKey.
2. Start cupsd ("service cups start").
  

Actual Results:  Permissions on the certificate files are altered.

Expected Results:  Permissions are not altered.

Additional info:

Comment 1 Tim Waugh 2005-10-19 12:33:56 UTC
Reported upstream:

  http://www.cups.org/str.php?L1324

Comment 2 Tim Waugh 2005-11-08 16:05:22 UTC
Will be fixed in a future version of CUPS.  Thanks for the report.