Project

General

Profile

Actions

Bug #41320

closed

Feature #47765: mgr/dashboard: security improvements

mgr/dashboard: passwords and other sensitive information is written to logs

Added by Ernesto Puerta over 4 years ago. Updated about 3 years ago.

Status:
Resolved
Priority:
High
Assignee:
Category:
General
Target version:
-
% Done:

0%

Source:
Tags:
security
Backport:
nautilus
Regression:
No
Severity:
2 - major
Reviewed:
Affected Versions:
ceph-qa-suite:
Pull request ID:
Crash signature (v1):
Crash signature (v2):

Description

Currently dashboard is storing in plain text logs the following sentitive information:

- Dashboard user names, passwords and roles. -> handled in #37503

log_channel(audit) log [DBG] : from='client.4126 -' entity='client.admin' cmd=[{"username": "admin", "rolename": "administrator", "prefix": "dashboard ac-user-create", "password": "admin"}]

- RGW API keys:

cmd=[{"prefix": "dashboard set-rgw-api-access-key", "target": ["mgr", ""], "value": "<real_key>"}]
cmd=[{"prefix": "dashboard set-rgw-api-secret-key", "target": ["mgr", ""], "value": "<real_key>"}]:

- JWT tokens:

"JWT Token: <real_token>"

This information should be redacted from the logs. While access to logs could be limited to privileged users, this is considered insecure (even with hashed passwords).


Related issues 2 (0 open2 closed)

Related to Ceph - Bug #37503: Audit log: mgr module passwords set on CLI written as plaintext in log filesResolvedNeha Ojha

Actions
Copied to Dashboard - Backport #41980: nautilus: mgr/dashboard: passwords and other sensitive information is written to logsResolvedNathan CutlerActions
Actions

Also available in: Atom PDF