Bug 1911003
| Summary: | dovecot-init.service using incorrect hard-coded certificate path | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8 | Reporter: | Chris <tech> |
| Component: | dovecot | Assignee: | Michal Hlavinka <mhlavink> |
| Status: | CLOSED NOTABUG | QA Contact: | CS System Management SST QE <rhel-cs-system-management-subsystem-qe> |
| Severity: | medium | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | CentOS Stream | CC: | bstinson, carl, jwboyer |
| Target Milestone: | rc | ||
| Target Release: | 8.0 | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2021-02-21 23:13:52 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Chris
2020-12-26 21:45:55 UTC
Same problem for other products as well I expect:- # grep -r pem /usr/lib/systemd/ /usr/lib/systemd/system/unbound-anchor.service:ExecStart=/usr/sbin/unbound-anchor -a /var/lib/unbound/root.key -c /etc/unbound/icannbundle.pem -f /etc/resolv.conf -R /usr/lib/systemd/system/cyrus-imapd-init.service:ConditionPathExists=!/etc/pki/cyrus-imapd/cyrus-imapd.pem /usr/lib/systemd/system/cyrus-imapd-init.service:ConditionPathExists=!/etc/pki/cyrus-imapd/cyrus-imapd-key.pem /usr/lib/systemd/system/cyrus-imapd-init.service:ConditionPathExists=!/etc/pki/cyrus-imapd/cyrus-imapd-ca.pem /usr/lib/systemd/system/cyrus-imapd-init.service:ExecStart=/usr/bin/sscg --package cyrus-imapd --cert-file /etc/pki/cyrus-imapd/cyrus-imapd.pem --cert-key-file /etc/pki/cyrus-imapd/cyrus-imapd-key.pem --ca-file /etc/pki/cyrus-imapd/cyrus-imapd-ca.pem --cert-key-mode=0640 Your scripts need to honor the actual certificate locations of the product configuration files ALWAYS - hardcoded locations are never the right decision. (Do you have a system to work out which of your staff wrote the above scripts? *All* of their work almost certainly needs a review - these kinds of quick-and-dirty shortcut hacks suggest that they have a dangerous work ethic which almost certainly will be causing other problems in the other stuff they've been involved with...) Letsencrypt is your choice for certificate and you have to configure that to make it work. ANY real crypto and security needs proper configuration, before it can be deployed in production environment. It just contains default values to make it somewhat work out of the box. systemd unit files are part of a configuration, it's not hardcored data,it just contains default values. If you don't use it or want to use something different, you can change that. |