-
-
Notifications
You must be signed in to change notification settings - Fork 38
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Set tight permissions for key files #7
Comments
Comment by danmilon World readable private key? ouch! |
Comment by Lekensteyn Updated patchset against latest master, added a rough separate test case as AccountKey got removed. |
Comment by kuba There are 3 parties potentially involved with the typical usage scenario:
If we assume that those three parties are different users (say
Restricting key file to I would like those kind of cases to be clearly sorted out (and by that I mean short design doc, possibly included in the repo itself) before merging. |
Comment by danmilon AFAIK apache runs as root to bind to privilaged ports and/or read the private key, and then spawns other processes as a non-privilaged user (e.g. I don't know if other web servers work similarly. |
This PR doesn't look like quite the right solution, so I'm going to close. For reference, this was intended to solve kuba/simp_le#29 which corresponds to #6. |
Issue by Lekensteyn
Saturday Dec 05, 2015 at 15:11 GMT
Originally opened as kuba/simp_le#34
Ensure that key files are not world-readable.
temp_umask is based on test.support.temp_umask.
Fixes #29
If older Python versions do not have to be supported, then the test code could become something like:
Lekensteyn included the following code: https://github.com/kuba/simp_le/pull/34/commits
The text was updated successfully, but these errors were encountered: