You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Andreas Schulze gave some feedback on the mutual tls(-auth) (#185 and #337) feature on the nsd-users mailing list.
It appears certificates specified with client-cert are read on opening a connection. Think about updating the logic to read the certificates before dropping privileges, a more extensive description is provided by Andreas below:
NSD serving as simple TLS server is configured with:
Here, the files /path/to/*.pem are used by a child process with limited privileges of the username 'nsd' It would be better, if nsd read all tls-auth client-[cert|key] data before dropping privileges. Then the files could be still limited to be readable by the root user.
The text was updated successfully, but these errors were encountered:
Andreas Schulze gave some feedback on the mutual tls(-auth) (#185 and #337) feature on the nsd-users mailing list.
It appears certificates specified with
client-cert
are read on opening a connection. Think about updating the logic to read the certificates before dropping privileges, a more extensive description is provided by Andreas below:NSD serving as simple TLS server is configured with:
In this mode,
/path/to/*.pem
may accessible for the root user only.Now, when adding a tls-auth for the purpose of client authentication I add:
Here, the files
/path/to/*.pem
are used by a child process with limited privileges of the username 'nsd' It would be better, if nsd read all tls-auth client-[cert|key] data before dropping privileges. Then the files could be still limited to be readable by the root user.The text was updated successfully, but these errors were encountered: