Last modified: 2014-09-01 11:05:46 UTC

Wikimedia Bugzilla is closed!

Wikimedia migrated from Bugzilla to Phabricator. Bug reports are handled in Wikimedia Phabricator.
This static website is read-only and for historical purposes. It is not possible to log in and except for displaying bug reports and their history, links might be broken. See T62112, the corresponding Phabricator task for complete and up-to-date bug report information.
Bug 60112 - Icinga has httpauth on (not accessible for public)
Icinga has httpauth on (not accessible for public)
Status: NEW
Product: Wikimedia
Classification: Unclassified
General/Unknown (Other open bugs)
wmf-deployment
All All
: Normal normal (vote)
: ---
Assigned To: Nobody - You can work on this!
https://icinga.wikimedia.org/icinga
: ops
Depends on: 61413
Blocks:
  Show dependency treegraph
 
Reported: 2014-01-15 23:27 UTC by se4598
Modified: 2014-09-01 11:05 UTC (History)
9 users (show)

See Also:
Web browser: ---
Mobile Platform: ---
Assignee Huggle Beta Tester: ---


Attachments
Backport fix for CVE-2013-7106. (2.99 KB, patch)
2014-02-14 10:06 UTC, Tim Landscheidt
Details
Backport fix for CVE-2013-7108. (4.87 KB, patch)
2014-02-14 10:07 UTC, Tim Landscheidt
Details
Backport fix for CVE-2013-7107. (3.21 KB, patch)
2014-02-14 11:09 UTC, Tim Landscheidt
Details

Description se4598 2014-01-15 23:27:57 UTC
Just noticed that Icinga apparently has httpauth on, so it's not accessible for me (the public).
Is there a security issue or other reason that forced this?

also http://status.wikimedia.org/ reports it as down for several days.
Comment 1 Andre Klapper 2014-01-16 00:19:48 UTC
Logging in works for me with my a Labs / wikitech.wikimedia.org account, but that might just be because I'm in a specific LDAP group, like bug 54713.
Comment 2 se4598 2014-01-16 01:18:11 UTC
(In reply to comment #1)
yep, logging in with wikitech-acc doesn't work for me.

Basically all I expect as answer here is a information why it currently on and when it is expected to be disabled again.
(icinga is on neon and this has nothing to do with graphite's apparently pending security review, right? bug 54713#c5)
Comment 3 Tim Landscheidt 2014-01-23 04:05:27 UTC
RobH said in #wikimedia-operations that "there are security issues with icinga iirc".
Comment 4 Maarten Dammers 2014-02-03 11:47:10 UTC
Ok. So we used to have Nagios which anyone could have a look at to see what's wrong. Someone decided to switch to another tool (Icinga). Now it turns out that that tool has security issues and public access got disabled? Way to go.....
Comment 5 Nemo 2014-02-03 16:55:56 UTC
It's been so since December. Originally I understood it was a matter of days...

2013-12-20 12.31 < whym> icinga.wikimedia.org now requirs authorization from me.  Is this how it's intended to be?
2013-12-20 12.39 < paravoid> whym: there are a couple of security vulnerabilities for icinga in the wild, so we've temporarily locked public access

https://gerrit.wikimedia.org/r/#/c/100989/
Comment 6 p858snake 2014-02-04 23:29:48 UTC
(In reply to comment #4)
> Ok. So we used to have Nagios which anyone could have a look at to see what's
> wrong. Someone decided to switch to another tool (Icinga). Now it turns out
> that that tool has security issues and public access got disabled? Way to
> go.....

IIRC nagois had security issues as well.
Comment 7 Andre Klapper 2014-02-13 13:53:55 UTC
Filed for ops as RT #6838
Comment 8 Faidon Liambotis 2014-02-13 14:41:22 UTC
Yes, there are security issues with Icinga that forced us to lock it down temporarily back in December 12th.

These are CVE-2013-7106, CVE-2013-7107 & CVE-2013-7108. They are still unfixed in Ubuntu precise (LTS); Icinga is in the universe section, so the Ubuntu security team deals with them on a "best effort" basis (i.e. they might not even update it, at all).

The vulnerability status per Ubuntu distribution can be tracked at:
http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-7106.html
http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-7107.html
http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-7108.html
respectively. Note how they decided to ignore the first one (a CSRF), which shows IMHO a poor judgement from their part.

I don't think we can take the time to do a major Icinga version upgrade right now, nor to backport the fixes ourselves. Our current strategy is "wait for Ubuntu", but if anyone wants to help the backporting process (and optionally engage with the Ubuntu security team so others can benefit from that) that'd be awesome.
Comment 9 Tim Landscheidt 2014-02-14 10:06:06 UTC
Created attachment 14586 [details]
Backport fix for CVE-2013-7106.
Comment 10 Tim Landscheidt 2014-02-14 10:07:25 UTC
Created attachment 14587 [details]
Backport fix for CVE-2013-7108.
Comment 11 Tim Landscheidt 2014-02-14 11:09:52 UTC
Created attachment 14588 [details]
Backport fix for CVE-2013-7107.
Comment 12 Faidon Liambotis 2014-02-14 12:36:35 UTC
Hey, that's good stuff! Thanks! Would you mind terribly contacting the Ubuntu security team to offer these code backports? Their usual response is "you're on your own", but if you attach code they might treat it differently, who knows :)
Comment 13 Tim Landscheidt 2014-02-14 12:50:28 UTC
No, I don't mind, but I need to test it first at least once :-).  I've asked petan for access to the Nagios project on Labs, will set up a new instance there and see if the package I baked works.

(Ceterum censeo Debian packaging esse delendam.  I simply love Fedora (and other RPM distros) for its cleanliness; on Debian I'm never sure what patches and files end up in the (source) package.)
Comment 14 Alexandros Kosiaris 2014-04-17 09:16:39 UTC
Hey Tim, have you contacted the Ubuntu security team? Anything we can do to help?
Comment 15 Tim Landscheidt 2014-04-17 12:38:35 UTC
*argl*  Forgot to test it; now I see the bugs have expired.  I'll test it Real Soon Now(TM) and get back to you if there's anything unsurmountable.
Comment 16 Ricky Elrod 2014-09-01 11:05:46 UTC
Been a few months - any update here? Or anything I (as a community member) can do to help with moving this along? :)

Note You need to log in before you can comment on or make changes to this bug.


Navigation
Links