You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
matyasselmeci opened this issue
May 6, 2024
· 0 comments
· Fixed by #1850
Assignees
Labels
cacheIssue relating to the cache componentcriticalHigh priority for next releasedirectorIssue relating to the director componentenhancementNew feature or requestoriginIssue relating to the origin componentregistryIssue relating to the registry component
The Pelican web/API server runs as root; this means that a security vulnerability would result in the attacker having root privileges on the server, which is not good. This is especially an issue since we instruct people to open the API server to the world.
Have the process running the API server drop privileges. Allow the admin to specify the Unix user and group in their config; by default both should be named 'pelican'. The native packages (RPMs and Debs) should create this user and group if they does not exist. The Dockerfiles should pre-create the user and group with a fixed UID/GID.
Ignore the user:group setting if Pelican is not started as root. Exit with an error if Pelican is started as root but cannot drop privileges (e.g. due to the user not existing). Give a big warning but continue if the admin specifies root:root as the user:group.
The text was updated successfully, but these errors were encountered:
cacheIssue relating to the cache componentcriticalHigh priority for next releasedirectorIssue relating to the director componentenhancementNew feature or requestoriginIssue relating to the origin componentregistryIssue relating to the registry component
Pelican Service:
The Pelican web/API server runs as root; this means that a security vulnerability would result in the attacker having root privileges on the server, which is not good. This is especially an issue since we instruct people to open the API server to the world.
Have the process running the API server drop privileges. Allow the admin to specify the Unix user and group in their config; by default both should be named 'pelican'. The native packages (RPMs and Debs) should create this user and group if they does not exist. The Dockerfiles should pre-create the user and group with a fixed UID/GID.
Ignore the user:group setting if Pelican is not started as root. Exit with an error if Pelican is started as root but cannot drop privileges (e.g. due to the user not existing). Give a big warning but continue if the admin specifies root:root as the user:group.
The text was updated successfully, but these errors were encountered: