Browse code

[stable-2.10] Revert default mode changes (#71260)

* Revert "[stable-2.10] Revert "Change default file permissions so they are not world readable (#70221) (#70824)" (#71236)"

This reverts commit c968020d52e56613dc78b2a21d22889c3ed4e7db.

* Revert "Remove porting guide entry related to reverted change (#71242)"

This reverts commit 006a21eae24be30e2e62d87d27be404b090b3028.

Rick Elrod authored on 2020/08/14 02:17:47
Showing 11 changed files
1 1
new file mode 100644
... ...
@@ -0,0 +1,4 @@
0
+bugfixes:
1
+  - >
2
+    **security issue** atomic_move - change default permissions when creating
3
+    temporary files so they are not world readable (https://github.com/ansible/ansible/issues/67794) (CVE-2020-1736)
0 4
new file mode 100644
... ...
@@ -0,0 +1,4 @@
0
+bugfixes:
1
+  - >
2
+    Fix warning for default permission change when no mode is specified. Follow up
3
+    to https://github.com/ansible/ansible/issues/67794. (CVE-2020-1736)
... ...
@@ -47,6 +47,76 @@ Deprecated
47 47
 Modules
48 48
 =======
49 49
 
50
+Change to Default File Permissions
51
+----------------------------------
52
+
53
+To address CVE-2020-1736, the default permissions for certain files created by Ansible using ``atomic_move()`` were changed from ``0o666`` to ``0o600``. The default permissions value was only used for the temporary file before it was moved into its place or newly created files. If the file existed when the new temporary file was moved into place, Ansible would use the permissions of the existing file. If there was no existing file, Ansible would retain the default file permissions, combined with the system ``umask``, of the temporary file.
54
+
55
+Most modules that call ``atomic_move()`` also call ``set_fs_attributes_if_different()`` or ``set_mode_if_different()``, which will set the permissions of the file to what is specified in the task.
56
+
57
+A new warning will be displayed when all of the following conditions are true:
58
+
59
+    - The file at the final destination, not the temporary file, does not exist
60
+    - A module supports setting ``mode`` but it was not specified for the task
61
+    - The module calls ``atomic_move()`` but does not later call ``set_fs_attributes_if_different()`` or ``set_mode_if_different()`` with a ``mode`` specified
62
+
63
+The following modules call ``atomic_move()`` but do not call ``set_fs_attributes_if_different()``  or ``set_mode_if_different()`` and do not support setting ``mode``. This means for files they create, the default permissions have changed and there is no indication:
64
+
65
+    - M(known_hosts)
66
+    - M(service)
67
+
68
+
69
+Code Audit
70
+~~~~~~~~~~
71
+
72
+The code was audited for modules that use ``atomic_move()`` but **do not** later call ``set_fs_attributes_if_different()`` or ``set_mode_if_different()``. Modules that provide no means for specifying the ``mode`` will not display a warning message since there is no way for the playbook author to remove the warning. The behavior of each module with regards to the default permissions of temporary files and the permissions of newly created files is explained below.
73
+
74
+known_hosts
75
+^^^^^^^^^^^
76
+
77
+The M(known_hosts) module uses ``atomic_move()`` to operate on the ``known_hosts`` file specified by the ``path`` parameter in the module. It creates a temporary file using ``tempfile.NamedTemporaryFile()`` which creates a temporary file that is readable and writable only by the creating user ID.
78
+
79
+service
80
+^^^^^^^
81
+
82
+The M(service) module uses ``atomic_move()`` to operate on the default rc file, which is the first found of ``/etc/rc.conf``,  ``/etc/rc.conf.local``, and ``/usr/local/etc/rc.conf``. Since these files almost always exist on the target system, they will not be created and the existing permissions of the file will be used.
83
+
84
+**The following modules were included in Ansible <= 2.9. They have moved to collections but are documented here for completeness.**
85
+
86
+authorized_key
87
+^^^^^^^^^^^^^^
88
+
89
+The M(authorized_key) module uses ``atomic_move()`` to operate on the the ``authorized_key`` file. A temporary file is created with ``tempfile.mkstemp()`` before being moved into place. The temporary file is readable and writable only by the creating user ID. The M(authorized_key) module manages the permissions of the the ``.ssh`` direcotry and ``authorized_keys`` files if ``managed_dirs`` is set to ``True``, which is the default. The module sets the ``ssh`` directory owner and group to the ``uid`` and ``gid`` of the user specified in the ``user`` parameter and directory permissions to ``700``. The module sets the ``authorized_key`` file owner and group to the ``uid`` and ``gid`` of the user specified in the ``user`` parameter and file permissions to ``600``. These values cannot be controlled by module parameters.
90
+
91
+interfaces_file
92
+^^^^^^^^^^^^^^^
93
+The M(interfaces_file) module uses ``atomic_move()`` to operate on ``/etc/network/serivces`` or the ``dest`` specified by the module. A temporary file is created with ``tempfile.mkstemp()`` before being moved into place. The temporary file is readable and writable only by the creating user ID. If the file specified by ``path`` does not exist it will retain the permissions of the temporary file once moved into place.
94
+
95
+pam_limits
96
+^^^^^^^^^^
97
+
98
+The M(pam_limits) module uses ``atomic_move()`` to operate on ``/etc/security/limits.conf`` or the value of ``dest``. A temporary file is created using ``tempfile.NamedTemporaryFile()``, which is only readable and writable by the creating user ID. The temporary file will inherit the permissions of the file specified by ``dest``, or it will retain the permissions that only allow the creating user ID to read and write the file.
99
+
100
+pamd
101
+^^^^
102
+
103
+The M(pamd) module uses ``atomic_move()`` to operate on a file in ``/etc/pam.d``. The path and the file can be specified by setting the ``path`` and ``name`` parameters. A temporary file is created using ``tempfile.NamedTemporaryFile()``, which is only readable and writable by the creating user ID. The temporary file will inherit the permissions of the file located at ``[dest]/[name]``, or it will retain the permissions of the temporary file that only allow the creating user ID to read and write the file.
104
+
105
+redhat_subscription
106
+^^^^^^^^^^^^^^^^^^^
107
+
108
+The M(redhat_subscription) module uses ``atomic_move()`` to operate on ``/etc/yum/pluginconf.d/rhnplugin.conf`` and ``/etc/yum/pluginconf.d/subscription-manager.conf``. A temporary file is created with ``tempfile.mkstemp()`` before being moved into place. The temporary file is readable and writable only by the creating user ID and the temporary file will inherit the permissions of the existing file once it is moved in to place.
109
+
110
+selinux
111
+^^^^^^^
112
+
113
+The M(selinux) module uses ``atomic_move()`` to operate on ``/etc/selinux/config`` on the value specified by ``configfile``. The module will fail if ``configfile`` does not exist before any temporary data is written to disk. A temporary file is created with ``tempfile.mkstemp()`` before being moved into place. The temporary file is readable and writable only by the creating user ID. Since the file specified by ``configfile`` must exist, the temporary file will inherit the permissions of that file once it is moved in to place.
114
+
115
+sysctl
116
+^^^^^^
117
+
118
+The M(sysctl) module uses ``atomic_move()`` to operate on ``/etc/sysctl.conf`` or the value specified by ``sysctl_file``. The module will fail if ``sysctl_file`` does not exist before any temporary data is written to disk. A temporary file is created with ``tempfile.mkstemp()`` before being moved into place. The temporary file is readable and writable only by the creating user ID. Since the file specified by ``sysctl_file`` must exist, the temporary file will inherit the permissions of that file once it is moved in to place.
119
+
50 120
 .. warning::
51 121
 
52 122
 	Links on this page may not point to the most recent versions of modules. We will update them when we can.
... ...
@@ -704,7 +704,10 @@ class AnsibleModule(object):
704 704
         self._options_context = list()
705 705
         self._tmpdir = None
706 706
 
707
+        self._created_files = set()
708
+
707 709
         if add_file_common_args:
710
+            self._uses_common_file_args = True
708 711
             for k, v in FILE_COMMON_ARGUMENTS.items():
709 712
                 if k not in self.argument_spec:
710 713
                     self.argument_spec[k] = v
... ...
@@ -1125,6 +1128,13 @@ class AnsibleModule(object):
1125 1125
         if mode is None:
1126 1126
             return changed
1127 1127
 
1128
+        # Remove paths so we do not warn about creating with default permissions
1129
+        # since we are calling this method on the path and setting the specified mode.
1130
+        try:
1131
+            self._created_files.remove(path)
1132
+        except KeyError:
1133
+            pass
1134
+
1128 1135
         b_path = to_bytes(path, errors='surrogate_or_strict')
1129 1136
         if expand:
1130 1137
             b_path = os.path.expanduser(os.path.expandvars(b_path))
... ...
@@ -1420,6 +1430,11 @@ class AnsibleModule(object):
1420 1420
     def set_file_attributes_if_different(self, file_args, changed, diff=None, expand=True):
1421 1421
         return self.set_fs_attributes_if_different(file_args, changed, diff, expand)
1422 1422
 
1423
+    def add_atomic_move_warnings(self):
1424
+        for path in sorted(self._created_files):
1425
+            self.warn("File '{0}' created with default permissions '{1:o}'. The previous default was '666'. "
1426
+                      "Specify 'mode' to avoid this warning.".format(to_native(path), DEFAULT_PERM))
1427
+
1423 1428
     def add_path_info(self, kwargs):
1424 1429
         '''
1425 1430
         for results that are files, supplement the info about the file
... ...
@@ -2130,6 +2145,7 @@ class AnsibleModule(object):
2130 2130
 
2131 2131
     def _return_formatted(self, kwargs):
2132 2132
 
2133
+        self.add_atomic_move_warnings()
2133 2134
         self.add_path_info(kwargs)
2134 2135
 
2135 2136
         if 'invocation' not in kwargs:
... ...
@@ -2425,6 +2441,16 @@ class AnsibleModule(object):
2425 2425
                         self.cleanup(b_tmp_dest_name)
2426 2426
 
2427 2427
         if creating:
2428
+            # Keep track of what files we create here with default permissions so later we can see if the permissions
2429
+            # are explicitly set with a follow up call to set_mode_if_different().
2430
+            #
2431
+            # Only warn if the module accepts 'mode' parameter so the user can take action.
2432
+            # If the module does not allow the user to set 'mode', then the warning is useless to the
2433
+            # user since it provides no actionable information.
2434
+            #
2435
+            if self.argument_spec.get('mode') and self.params.get('mode') is None:
2436
+                self._created_files.add(dest)
2437
+
2428 2438
             # make sure the file has the correct permissions
2429 2439
             # based on the current value of umask
2430 2440
             umask = os.umask(0)
... ...
@@ -59,7 +59,7 @@ PERMS_RE = re.compile(r'[^rwxXstugo]')
59 59
 
60 60
 _PERM_BITS = 0o7777          # file mode permission bits
61 61
 _EXEC_PERM_BITS = 0o0111     # execute permission bits
62
-_DEFAULT_PERM = 0o0666       # default file permission bits
62
+_DEFAULT_PERM = 0o0600       # default file permission bits
63 63
 
64 64
 
65 65
 def is_executable(path):
... ...
@@ -8,7 +8,7 @@
8 8
     test_repo_spec: "deb http://apt.postgresql.org/pub/repos/apt/ {{ ansible_distribution_release }}-pgdg main"
9 9
     test_repo_path: /etc/apt/sources.list.d/apt_postgresql_org_pub_repos_apt.list
10 10
 
11
-- include: mode_cleanup.yaml
11
+- import_tasks: mode_cleanup.yaml
12 12
 
13 13
 - name: Add GPG key to verify signatures
14 14
   apt_key:
... ...
@@ -31,7 +31,7 @@
31 31
   debug:
32 32
     var: mode_given_yaml_literal_0600
33 33
 
34
-- include: mode_cleanup.yaml
34
+- import_tasks: mode_cleanup.yaml
35 35
 
36 36
 - name: Assert mode_given_yaml_literal_0600 is correct
37 37
   assert:
... ...
@@ -52,11 +52,11 @@
52 52
   debug:
53 53
     var: no_mode_stat
54 54
 
55
-- include: mode_cleanup.yaml
55
+- import_tasks: mode_cleanup.yaml
56 56
 
57 57
 - name: Assert no_mode_stat is correct
58 58
   assert:
59
-    that: "no_mode_stat.stat.mode == '0644'"
59
+    that: "no_mode_stat.stat.mode == '0600'"
60 60
 
61 61
 - name: Mode specified as string 0600
62 62
   apt_repository:
... ...
@@ -74,7 +74,7 @@
74 74
   debug:
75 75
     var: mode_given_string_stat
76 76
 
77
-- include: mode_cleanup.yaml
77
+- import_tasks: mode_cleanup.yaml
78 78
 
79 79
 - name: Mode specified as string 600
80 80
   apt_repository:
... ...
@@ -92,7 +92,7 @@
92 92
   debug:
93 93
     var: mode_given_string_600_stat
94 94
 
95
-- include: mode_cleanup.yaml
95
+- import_tasks: mode_cleanup.yaml
96 96
 
97 97
 - name: Assert mode is correct
98 98
   assert:
... ...
@@ -114,7 +114,7 @@
114 114
   debug:
115 115
     var: mode_given_yaml_literal_600
116 116
 
117
-- include: mode_cleanup.yaml
117
+- import_tasks: mode_cleanup.yaml
118 118
 
119 119
 # a literal 600 as the mode will fail currently, in the sense that it
120 120
 # doesn't guess and consider 600 and 0600 to be the same, and will instead
... ...
@@ -127,4 +127,4 @@
127 127
 # See https://github.com/ansible/ansible/issues/16370
128 128
 - name: Assert mode_given_yaml_literal_600 is correct
129 129
   assert:
130
-    that: "mode_given_yaml_literal_600.stat.mode == '1130'"
131 130
\ No newline at end of file
131
+    that: "mode_given_yaml_literal_600.stat.mode == '1130'"
132 132
new file mode 100644
... ...
@@ -0,0 +1 @@
0
+shippable/posix/group5
0 1
new file mode 100644
... ...
@@ -0,0 +1,36 @@
0
+#!/usr/bin/python
1
+# -*- coding: utf-8 -*-
2
+# Copyright (c) 2020 Ansible Project
3
+# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
4
+
5
+from __future__ import absolute_import, division, print_function
6
+__metaclass__ = type
7
+
8
+import tempfile
9
+
10
+from ansible.module_utils.basic import AnsibleModule
11
+
12
+
13
+def main():
14
+    module = AnsibleModule(
15
+        argument_spec={
16
+            'dest': {'type': 'path'},
17
+            'call_fs_attributes': {'type': 'bool', 'default': True},
18
+        },
19
+        add_file_common_args=True,
20
+    )
21
+
22
+    results = {}
23
+
24
+    with tempfile.NamedTemporaryFile(delete=False) as tf:
25
+        file_args = module.load_file_common_arguments(module.params)
26
+        module.atomic_move(tf.name, module.params['dest'])
27
+
28
+        if module.params['call_fs_attributes']:
29
+            results['changed'] = module.set_fs_attributes_if_different(file_args, True)
30
+
31
+    module.exit_json(**results)
32
+
33
+
34
+if __name__ == '__main__':
35
+    main()
0 36
new file mode 100644
... ...
@@ -0,0 +1,2 @@
0
+dependencies:
1
+  - setup_remote_tmp_dir
0 2
new file mode 100644
... ...
@@ -0,0 +1,33 @@
0
+- name: Run task with no mode
1
+  test_perm_warning:
2
+    dest: "{{ remote_tmp_dir }}/endangerdisown"
3
+  register: no_mode_results
4
+
5
+- name: Run task with mode
6
+  test_perm_warning:
7
+    mode: '0644'
8
+    dest: "{{ remote_tmp_dir }}/groveestablish"
9
+  register: with_mode_results
10
+
11
+- name: Run task without calling set_fs_attributes_if_different()
12
+  test_perm_warning:
13
+    call_fs_attributes: no
14
+    dest: "{{ remote_tmp_dir }}/referabletank"
15
+  register: skip_fs_attributes
16
+
17
+- stat:
18
+    path: "{{ remote_tmp_dir }}/{{ item }}"
19
+  loop:
20
+    - endangerdisown
21
+    - groveestablish
22
+  register: files
23
+
24
+- name: Ensure we get a warning when appropriate
25
+  assert:
26
+    that:
27
+      - no_mode_results.warnings | default([], True) | length == 1
28
+      - "'created with default permissions' in no_mode_results.warnings[0]"
29
+      - files.results[0]['stat']['mode'] == '0600'
30
+      - files.results[1]['stat']['mode'] == '0644'
31
+      - with_mode_results.warnings is not defined  # The Jinja version on CentOS 6 does not support default([], True)
32
+      - skip_fs_attributes.warnings | default([], True) | length == 1
... ...
@@ -63,7 +63,7 @@ def atomic_mocks(mocker, monkeypatch):
63 63
 @pytest.fixture
64 64
 def fake_stat(mocker):
65 65
     stat1 = mocker.MagicMock()
66
-    stat1.st_mode = 0o0644
66
+    stat1.st_mode = 0o0600
67 67
     stat1.st_uid = 0
68 68
     stat1.st_gid = 0
69 69
     stat1.st_flags = 0
... ...
@@ -80,7 +80,7 @@ def test_new_file(atomic_am, atomic_mocks, mocker, selinux):
80 80
     atomic_am.atomic_move('/path/to/src', '/path/to/dest')
81 81
 
82 82
     atomic_mocks['rename'].assert_called_with(b'/path/to/src', b'/path/to/dest')
83
-    assert atomic_mocks['chmod'].call_args_list == [mocker.call(b'/path/to/dest', basic.DEFAULT_PERM & ~18)]
83
+    assert atomic_mocks['chmod'].call_args_list == [mocker.call(b'/path/to/dest', basic.DEFAULT_PERM & ~0o022)]
84 84
 
85 85
     if selinux:
86 86
         assert atomic_am.selinux_default_context.call_args_list == [mocker.call('/path/to/dest')]
... ...
@@ -101,7 +101,7 @@ def test_existing_file(atomic_am, atomic_mocks, fake_stat, mocker, selinux):
101 101
     atomic_am.atomic_move('/path/to/src', '/path/to/dest')
102 102
 
103 103
     atomic_mocks['rename'].assert_called_with(b'/path/to/src', b'/path/to/dest')
104
-    assert atomic_mocks['chmod'].call_args_list == [mocker.call(b'/path/to/src', basic.DEFAULT_PERM & ~18)]
104
+    assert atomic_mocks['chmod'].call_args_list == [mocker.call(b'/path/to/src', basic.DEFAULT_PERM & ~0o022)]
105 105
 
106 106
     if selinux:
107 107
         assert atomic_am.set_context_if_different.call_args_list == [mocker.call('/path/to/dest', mock_context, False)]
... ...
@@ -124,7 +124,7 @@ def test_no_tty_fallback(atomic_am, atomic_mocks, fake_stat, mocker):
124 124
     atomic_am.atomic_move('/path/to/src', '/path/to/dest')
125 125
 
126 126
     atomic_mocks['rename'].assert_called_with(b'/path/to/src', b'/path/to/dest')
127
-    assert atomic_mocks['chmod'].call_args_list == [mocker.call(b'/path/to/src', basic.DEFAULT_PERM & ~18)]
127
+    assert atomic_mocks['chmod'].call_args_list == [mocker.call(b'/path/to/src', basic.DEFAULT_PERM & ~0o022)]
128 128
 
129 129
     assert atomic_am.set_context_if_different.call_args_list == [mocker.call('/path/to/dest', mock_context, False)]
130 130
     assert atomic_am.selinux_context.call_args_list == [mocker.call('/path/to/dest')]
... ...
@@ -154,7 +154,7 @@ def test_existing_file_stat_perms_failure(atomic_am, atomic_mocks, mocker):
154 154
     atomic_mocks['rename'].assert_called_with(b'/path/to/src', b'/path/to/dest')
155 155
     # FIXME: Should atomic_move() set a default permission value when it cannot retrieve the
156 156
     # existing file's permissions?  (Right now it's up to the calling code.
157
-    # assert atomic_mocks['chmod'].call_args_list == [mocker.call(b'/path/to/src', basic.DEFAULT_PERM & ~18)]
157
+    # assert atomic_mocks['chmod'].call_args_list == [mocker.call(b'/path/to/src', basic.DEFAULT_PERM & ~0o022)]
158 158
     assert atomic_am.set_context_if_different.call_args_list == [mocker.call('/path/to/dest', mock_context, False)]
159 159
     assert atomic_am.selinux_context.call_args_list == [mocker.call('/path/to/dest')]
160 160
 
... ...
@@ -211,7 +211,7 @@ def test_rename_perms_fail_temp_succeeds(atomic_am, atomic_mocks, fake_stat, moc
211 211
     atomic_am.atomic_move('/path/to/src', '/path/to/dest')
212 212
     assert atomic_mocks['rename'].call_args_list == [mocker.call(b'/path/to/src', b'/path/to/dest'),
213 213
                                                      mocker.call(b'/path/to/tempfile', b'/path/to/dest')]
214
-    assert atomic_mocks['chmod'].call_args_list == [mocker.call(b'/path/to/dest', basic.DEFAULT_PERM & ~18)]
214
+    assert atomic_mocks['chmod'].call_args_list == [mocker.call(b'/path/to/dest', basic.DEFAULT_PERM & ~0o022)]
215 215
 
216 216
     if selinux:
217 217
         assert atomic_am.selinux_default_context.call_args_list == [mocker.call('/path/to/dest')]