Opened 11 years ago
Last modified 8 years ago
#376 accepted enhancement
log file reopen should pass opened fd from master process
Reported by: | Tiziano Müller | Owned by: | |
---|---|---|---|
Priority: | minor | Milestone: | |
Component: | nginx-core | Version: | |
Keywords: | Cc: | ||
uname -a: | n/a | ||
nginx -V: | n/a |
Description
When starting nginx all the log files (error_log, access_log) are created and opened by the master process and the filehandles passed to the worker while forking.
On SIGUSR1 the master reopens the files, chown's them and then the worker reopens the files himself. This has several drawbacks:
- It is inconsistent behaviour and rather surprising (sudden change of ownership upon signal). If you really want to do it this way you should chown the files from the very beginning.
- It permits the unprivileged nginx user read and write access to the current log files which is bad from the security perspective since the unprivileged user also needs to be able to change into/read the log directory
A better solution may be to reopen the log files in the master process as currently done and then use the already available ngx_{read,write}_channel functions to pass the new filehandles down to the worker.
Change History (4)
comment:1 by , 11 years ago
comment:2 by , 11 years ago
Status: | new → accepted |
---|
comment:3 by , 8 years ago
What would it take to get some attention drawn to this bug?
In Debian, we thought we fixed one broken hack to address a CVE [1], but years later it was brought to our attention that we'd inadvertently created a bigger concern [2]. Now, we've reverted back to the old behavior, in effect, re-opening the old CVE.
It appears this is not just a Debian problem. I've looked around at other distributions and haven't been able to find any that don't have some form of security concern.
I'll admit, most of the security concerns require at least one other vulnerability be exploited, but web application vulnerabilities aren't exactly uncommon.
[1] https://security-tracker.debian.org/tracker/CVE-2013-0337
[2] https://security-tracker.debian.org/tracker/CVE-2016-1247
comment:4 by , 8 years ago
To make matter worse, the log is always opened using O_CREAT, disallowing the use of AppArmor to restrict the log file opening to append only.
The workaround we're using is:
- Make a AppArmor profile which removes chown capability from Nginx.
- chown -R root:adm /var/log/nginx
- chmod 0755 /var/log/nginx
- chmod 0640 /var/log/nginx/*
- Setup logrotate to create files as www-data:adm/0640.
- Setup logrotate post-rotate to invoke-rc.d nginx rotate, then, chown root /var/log/nginx/*.log
/etc/apparmor.d/usr.sbin.nginx
#include <tunables/global> /usr/sbin/nginx { #include <abstractions/base> #include <abstractions/nameservice> deny capability chown, capability dac_override, capability net_bind_service, capability setgid, capability setuid, /etc/nginx/** r, /etc/ssl/certs/** r, /etc/ssl/openssl.cnf r, /run/nginx.pid rw, /run/nginx.pid.oldbin rw, /usr/lib/nginx/modules/*.so mr, /usr/sbin/nginx mr, /usr/share/nginx/** r, /var/cache/nginx/ rw, /var/cache/nginx/** rw, /var/lib/nginx/ r, /var/lib/nginx/** rw, /var/log/nginx/*.log w, /var/log/nginx/*.log.1 w, /var/www/** r, #include <nginx.d> #include <local/usr.sbin.nginx> }
/etc/logrotate.d/nginx
/var/log/nginx/*.log { ... create 0640 www-data adm postrotate invoke-rc.d nginx rotate >/dev/null 2>&1 sleep 2 chown root:adm /var/log/nginx/*.log endscript }
EDIT: Updated procedure to prevent having to reload nginx.
Current behaviour is as follows:
This allows to use any permissions desired as long as logfile quick reopen isn't used (e.g., full configuration reload is used instead), and ensures logfile quick reopen works as currently implemented. While ownership change after USR1 might be a bit surprising for unfamiliar users, it is believed to be better than unconditional ownership change in any case. The need of execute bit on a log directory doesn't looks like a problem, too (note that read access isn't needed). If you are paranoid enough, you can use full configuration reload instead.
On the other hand, passing opened file descriptors from a master process is certainly better approach on platforms which support it, mostly because it needs less configuration. It is planned enhancement for a long time, let this ticket sit in trac as a reminder.