Bug 2333072 - RabbitMQ: a Fedora-specific patch allows for remote connections with default, well known administrative credentials
Summary: RabbitMQ: a Fedora-specific patch allows for remote connections with default,...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: rabbitmq-server
Version: rawhide
Hardware: All
OS: Linux
unspecified
urgent
Target Milestone: ---
Assignee: Richard W.M. Jones
QA Contact: Fedora Extras Quality Assurance
URL: https://src.fedoraproject.org/rpms/ra...
Whiteboard:
: 2333073 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-12-18 19:44 UTC by Michael Klishin
Modified: 2025-01-03 11:40 UTC (History)
2 users (show)

Fixed In Version: rabbitmq-server-4.0.5-2.fc42
Clone Of:
Environment:
Last Closed: 2025-01-03 11:40:51 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Michael Klishin 2024-12-18 19:44:49 UTC
I am a RabbitMQ core team member and a long time contributor.

By default, RabbitMQ seeds its internal database with a set of well known (unless overridden) pair of credentials. Remote connections for such users are intentionally prohibited for obvious security reasons [1].

Fedora has been patching RabbitMQ to allow such connections [2] since 2014.

This has obvious security implications for installations that install RabbitMQ from the default Fedora repositories, and intentionally violates a recommended security practice [3].

On behalf of the RabbitMQ core team I'd recommend removing the patch. Overriding default user credentials to something Fedora-specific won't matter much, this is up to cluster operators to use a generated set of credentials.

This has some negative effects on the user experience for beginners but this default restriction has been in place for some 15 years (if not longer), is widely known and documented in several RabbitMQ documentation guies.

It's high time that Fedora stops intentionally introducing a very unsafe default.

1. https://www.rabbitmq.com/docs/access-control#loopback-users
2. https://src.fedoraproject.org/rpms/rabbitmq-server/blob/rawhide/f/rabbitmq-server-0001-Allow-guest-login-from-non-loopback-connections.patch
3. https://www.rabbitmq.com/docs/production-checklist#users

Reproducible: Always

Steps to Reproduce:
1. dnf install rabbitmq-server
2. rabbitmq-diagnostics environment
3. see the value of the loopback_users key on a brand new node without any configuration customization


Expected Results:  
Fedora-packaged RabbitMQ is not patched with https://src.fedoraproject.org/rpms/rabbitmq-server/blob/rawhide/f/rabbitmq-server-0001-Allow-guest-login-from-non-loopback-connections.patch.

I intentionally set severity to Urgent because to me, this patch is a catastrophically bad decision.

Comment 1 Richard W.M. Jones 2025-01-02 14:54:42 UTC
*** Bug 2333073 has been marked as a duplicate of this bug. ***

Comment 2 Richard W.M. Jones 2025-01-02 15:05:05 UTC
Raised the topic on devel list to increase visibility:
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/thread/ZETIKNPWZIINJDTQ4FNY436CEMTMVXS3/

Comment 4 Fedora Update System 2025-01-03 11:35:50 UTC
FEDORA-2025-7c46ce9b7d (rabbitmq-server-4.0.5-2.fc42) has been submitted as an update to Fedora 42.
https://bodhi.fedoraproject.org/updates/FEDORA-2025-7c46ce9b7d

Comment 5 Fedora Update System 2025-01-03 11:40:51 UTC
FEDORA-2025-7c46ce9b7d (rabbitmq-server-4.0.5-2.fc42) has been pushed to the Fedora 42 stable repository.
If problem still persists, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.