Bug #3370

Access to graphs and reports from trusted network

Added by Filippo Carletti over 5 years ago. Updated about 5 years ago.

Status:CLOSEDStart date:
Priority:NormalDue date:
Assignee:-% Done:

100%

Category:<multiple packages>
Target version:v6.7
Security class:low Resolution:
Affected version:v6.7 NEEDINFO:No

Description

Even if I limit external httpd-admin access from my ip public address, I can view cgp/collectd graphs and lightsquid reports fro anywhere.
The URL is "obfuscated" and hard to guess, but I'd prefer to enforce access following httpd-admin access control.


Related issues

Related to NethServer 6 - Bug #3402: Syntax error in cgp and collectd-web httpd conf CLOSED

Associated revisions

Revision 7a9fe5cd
Added by Giacomo Sanchietti about 5 years ago

Http conf: restrict access if httpd-admin[AllowHosts] is set. Refs #3370

Revision 0531f2b2
Added by Giacomo Sanchietti about 5 years ago

httpd: restrict access if httpd-admin[AllowHosts] is set. Refs #3370

History

#1 Updated by Filippo Carletti over 5 years ago

  • Status changed from NEW to TRIAGED
  • % Done changed from 0 to 20

CGP and collectd-web are missing a Deny directive:

# tail -8 /etc/e-smith/templates/etc/httpd/conf.d/cgp.conf/10base 
<Directory /var/www/html/cgp>
    Options Indexes FollowSymLinks MultiViews
    AllowOverride all
    Order deny,allow
    Allow from $localAccess
</Directory>

We need a "Deny from all" before "Allow from".

I also think that the access prop in /etc/e-smith/templates/etc/httpd/conf.d/cgp.conf/01localAccessString should be changed from ValidFrom to AllowHosts.

#2 Updated by Filippo Carletti about 5 years ago

  • Tracker changed from Enhancement to Bug
  • Category set to <multiple packages>
  • Security class set to low

#3 Updated by Giacomo Sanchietti about 5 years ago

  • Status changed from TRIAGED to ON_DEV
  • Assignee set to Giacomo Sanchietti
  • % Done changed from 20 to 30
  • Affected version set to v6.7

#4 Updated by Giacomo Sanchietti about 5 years ago

We should avoid to modify the actual behavior while providing a safe way to allow graphs access only from trusted networks.

Proposed solution:
  • if AllowHosts is set, the access must be enable only from listed networks
  • otherwise, the access should be enable by all networks

#5 Updated by Giacomo Sanchietti about 5 years ago

  • Status changed from ON_DEV to MODIFIED
  • % Done changed from 30 to 60

#6 Updated by Giacomo Sanchietti about 5 years ago

  • Status changed from MODIFIED to ON_QA
  • Assignee deleted (Giacomo Sanchietti)
  • % Done changed from 60 to 70
Packages in nethserver-testing:
  • nethserver-lightsquid-1.0.3-1.1.g7a9fe5c.ns6.noarch.rpm
  • nethserver-cgp-1.0.0-1.2.g0531f2b.ns6.noarch.rpm
  • nethserver-collectd-web-1.0.2-1.noarch.rpm
Test case 1
  • Do not set AllowHosts parameter for httpd-admin service inside Network Services page
  • Check Lightsquid/CGP/Collected web are accessible from any network
Test case 2
  • Set AllowHosts parameter for httpd-admin service inside Network Services page
  • Check Lightsquid/CGP/Collected web are accessible only from networks listed inside AllowHosts

#7 Updated by dz0 0te about 5 years ago

  • Assignee set to dz0 0te

#8 Updated by dz0 0te about 5 years ago

  • Status changed from ON_QA to TRIAGED
  • Assignee deleted (dz0 0te)
  • % Done changed from 70 to 20

System and Package Version installed
VM KVM - Clean install of Nethserver 6.7 fully updated
Package Installed:
Other Package installed: DNS and DHCP server
Statistics
Web proxy
Web server

Test Original Problem
Bug

Install Updated Package

yum --enablerepo=nethserver-testing  update  nethserver-lightsquid-1.0.3-1.1.g7a9fe5c.ns6.noarch nethserver-cgp-1.0.0-1.2.g0531f2b.ns6.noarch nethserver-collectd-web-1.0.2-1.ns6.noarch

Test Results after update
Test Case 1:
ok. access from any network

Test Case 2:
in http-admin service select only from green: access from any network on ip/cgp and ip/collectd-web (lightsquid not tested) in http and https
access to web console is blocked from any network correctly

Test Case 3:
in http-admin service select only from green with Allow Host a single ip: access from any network on ip/cgp and ip/collectd-web (lightsquid not tested) in http and https
access to web console is restricted to the IP correctly

Test Case 4:
in http-admin service select only from localhost : access from any network on ip/cgp and ip/collectd-web (lightsquid not tested) in http and https
access to web console is restricted to all correctly

the only way to vlock access is Set AllowHosts parameter for httpd service
inside Network Services page

Verified or Reopen
Reopen

Note

#9 Updated by Giacomo Sanchietti about 5 years ago

When changing the httpd-admin access property the system fires the firewall-adjust event.
The only way to fully automate the configuration changes to lightsquid, cgp, etc is the expansion of all templates and httpd restart inside the firewall adjust event.

I'd like to avoid such an overload for this rare scenario.

#10 Updated by Filippo Carletti about 5 years ago

I'd like to avoid such an overload for this rare scenario.

I agree. Given that v7 has solved this "problem" I'd release the updated package which improves the access restrictions.

#11 Updated by Giacomo Sanchietti about 5 years ago

  • Status changed from TRIAGED to MODIFIED
  • % Done changed from 20 to 60

Actual implementation confirmed.

#12 Updated by Giacomo Sanchietti about 5 years ago

  • Status changed from MODIFIED to ON_QA
  • % Done changed from 60 to 70

#13 Updated by Giacomo Sanchietti about 5 years ago

  • Status changed from ON_QA to VERIFIED
  • % Done changed from 70 to 90

#14 Updated by Giacomo Sanchietti about 5 years ago

  • Status changed from VERIFIED to CLOSED
  • % Done changed from 90 to 100
Released in nethserver-updates:
  • nethserver-cgp-1.0.1-1.ns6.noarch.rpm
  • nethserver-collectd-web-1.0.3-1.ns6.noarch.rpm
  • nethserver-lightsquid-1.0.4-1.ns6.noarch.rpm

#15 Updated by Filippo Carletti about 5 years ago

  • Related to Bug #3402: Syntax error in cgp and collectd-web httpd conf added

Also available in: Atom PDF