Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix dist automation security #20629

Closed
brson opened this Issue Jan 6, 2015 · 11 comments

Comments

Projects
None yet
6 participants
@brson
Copy link
Contributor

brson commented Jan 6, 2015

Our buildbot instance is set up so that anybody with the not-so-secret credentials can trigger a build. At present this means that anybody can publish any commit in the repo to a release channel at will.

@brson brson referenced this issue Jan 6, 2015

Closed

Automation metabug #17356

45 of 65 tasks complete
@Gankro

This comment has been minimized.

Copy link
Contributor

Gankro commented Jan 7, 2015

@brson brson added the I-nominated label Jan 14, 2015

@brson

This comment has been minimized.

Copy link
Contributor Author

brson commented Jan 14, 2015

Nominating because this could cause very bad problems if a stable release gets overwritten.

@bheesham

This comment has been minimized.

Copy link
Contributor

bheesham commented Jan 15, 2015

It looks like creating a passwords.py file, and adding it to .gitignore it is what the Mozilla Wiki recommends.

@alexcrichton

This comment has been minimized.

Copy link
Member

alexcrichton commented Apr 2, 2015

I believe this has been fixed, but feel free to correct me @brson

@brson

This comment has been minimized.

Copy link
Contributor Author

brson commented May 25, 2015

I don't consider this fixed yet because buildbot is still not behind HTTPS.

@alexcrichton alexcrichton reopened this May 26, 2015

@bheesham

This comment has been minimized.

Copy link
Contributor

bheesham commented Feb 8, 2016

Proxying requests to Buildbot through a server that supports TLS is the only way to get HTTPS working with Buildbot.

The buildbot web interface is already being proxied through nginx, so the configuration just needs to be tweaked to get it to be served over HTTPS.

@DemiMarie

This comment has been minimized.

Copy link
Contributor

DemiMarie commented Jun 29, 2016

Shouldn't this be P-High? It is a security vulnerability.

@steveklabnik steveklabnik added P-high and removed P-medium labels Jun 29, 2016

@steveklabnik

This comment has been minimized.

Copy link
Member

steveklabnik commented Jun 29, 2016

@DemiMarie thanks for the ping here. I believe that at one point, we re-named P-high to P-medium, since there were so many P-high issues, but given that this is security related, I think it's appropriate to re-mark it P-high. Or at the very least, I'm doing so so that this can be properly be re-evaluated by @brson and @alexcrichton ; if you two feel that's wrong for some reason, switch the tag back 😄

@alexcrichton

This comment has been minimized.

Copy link
Member

alexcrichton commented Jun 29, 2016

I've now configured letsencrypt and buildbot is behind HTTPS now, so I'm gonna close this. @brson though if I'm forgetting something feel free to reopen!

@DemiMarie

This comment has been minimized.

Copy link
Contributor

DemiMarie commented Jun 30, 2016

@alexcrichton Not @brson, just thinking in general about security, but just wondering if the buildbot credentials should be changed, since the current ones might have been leaked (and possibly changed to use TLS client certificates). HPKP might also be useful (the buildbot certificate should never change without everyone knowing).

@brson

This comment has been minimized.

Copy link
Contributor Author

brson commented Jun 30, 2016

@DemiMarie yes that's a good idea to change the passwords.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.