File: README.Debian

package info (click to toggle)
rabbitmq-server 4.0.5-6
  • links: PTS, VCS
  • area: main
  • in suites: sid, trixie
  • size: 37,948 kB
  • sloc: erlang: 257,835; javascript: 22,466; sh: 2,796; makefile: 2,517; python: 1,966; xml: 646; cs: 335; java: 244; ruby: 212; php: 100; perl: 63; awk: 13
file content (134 lines) | stat: -rw-r--r-- 4,941 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
*** WARNING ***

0/ Intro

RabbitMQ, in its default configuration, is insecure.  A number of
security measures are necessary to prevent remote execution of code
from malicious actors.


1/ Firewalling

A default RabbitMQ installation opens the following ports, with the
following authentication schemes:
 - 4369: EPMD daemon, for port lookups; IP-based auth limited to
   localhost
 - 5672: AMQP protcol; username/password auth
 - 25672: RabbitMQ "distribution" port for inter-node communication; a
   "magic cookie" shared secret for auth

Unauthorized access to all of these ports is a security risk; you
should configure your firewall to disallow outside access to them.
Speifically, unrestricted access to the port 25672, with the default
weak secret before 3.9.8-3 (see below), EXPOSES YOUR SERVER TO A
REMOTE CODE EXECUTION VULNERABILITY.  Unrestricted access to port 4369
serves to advertise that vulnerability.

Though not open by default, RabbitMQ may also be configured to open
the following ports, which are also strongly advised to be firewalled:
 - 5671: AMQP with SSL
 - 15671: Management port with SSL
 - 15672: Management port without SSL


2/ Erlang cookie

Prior to Debian version 3.9.8-3, rabbitmq-server generated an Erlang
"magic cookie" shared secret if one did not exist.  This secret is
stored in /var/lib/rabbitmq/.erlang.cookie

However, due to predictable seeds and a non-cryptographic randomizer,
the automatically-generated secret written by Erlang only supplies 20
to 40 bits of entropy.  This allows a remote attacker with access to
port 25672 to brute-force the "magic cookie," potentially within
minutes, authenticate as a remote node, and EXECUTE ARBITRARY CODE.

Since 3.9.8-3, the rabbitmq-server node will use openssl to generate a
cryptographically-secure cookie during first installation, mitigating
this vulnerability.

Servers which installed a prior version, and are upgrading to 3.9.8-3
or higher, ARE STILL VULNERABLE, as the package will not regenerate
the secret if it exists already.  This is because the secret is
designed to be shared between nodes in a cluster, and thus
regenerating it would break existing clusters.

Operators upgrading from earlier versions of rabbitmq-server are
strongly encouraged to generate a new secret.  This can be done via:

    openssl rand -base64 42 >/var/lib/rabbitmq/.erlang.cookie


3/ TLS

It is strongly advised to use TLS to protect data in transit to your
RabbitMQ cluster. Below is an example /etc/rabbitmq/rabbitmq.config
which achieves that; note that it uses only RAM nodes in the cluster,
which is not a recommended configuration for production, as it can
lead to data loss.

[
  {rabbit, [
    {loopback_users, [<<"guest">>]},
    {cluster_nodes, {['rabbit@node1.example.com', 'rabbit@node2.example.com', 'rabbit@node3.example.com'], ram}},
    {cluster_partition_handling, autoheal},
    {tcp_listen_options, [
         {backlog,       128},
         {nodelay,       true},
         {linger,        {true, 0}},
         {exit_on_close, false}
    ]},
    {collect_statistics_interval, 60000},
    {ssl_listeners, [{"10.0.1.3", 5671}]},
    {ssl_options, [
                   {cacertfile,"/etc/ssl/certs/my-cluster-ca-chain.pem"},
                   {certfile,"/etc/rabbitmq/ssl/public/node1.example.com.crt"},
                   {keyfile,"/etc/rabbitmq/ssl/private/node1.example.com.key"},
                   {secure_renegotiate,true},
                   {reuse_sessions,true},
                   {honor_cipher_order,true},
                   {verify,verify_none},
                   {fail_if_no_peer_cert,false}
                  ]},
    {vm_memory_high_watermark, 0.4},
    {default_user, <<"guest">>},
    {default_pass, <<"guest">>}
  ]},
  {kernel, [
    
  ]}
,
  {rabbitmq_management, [
    {listener, [
      {ip, "10.0.1.3"},
      {port, 15671},
      {ssl, true},
      {ssl_opts, [
                  {cacertfile, "/etc/ssl/certs/my-cluster-ca-chain.pem"},
                  {certfile, "/etc/rabbitmq/ssl/public/node1.example.com.crt"},
                  {keyfile, "/etc/rabbitmq/ssl/private/node1.example.com.key"},
                  {verify,verify_none},
                  {fail_if_no_peer_cert,false}
                 ]}
    ]}
  ]}
].

Documenting how to generate TLS certificates is out of the scope of
this small README. However, you can see an example script to do so
over here:

https://salsa.debian.org/openstack-team/debian/openstack-cluster-installer/-/blob/debian/xena/bin/oci-root-ca-gen

with the matching configuration files over here:

https://salsa.debian.org/openstack-team/debian/openstack-cluster-installer/-/tree/debian/xena/etc/openstack-cluster-installer/pki


4/ guest account

The "guest" account which is pre-configured in the initial
installation is only accessible from 127.0.0.1 or ::1; its password is
also initially set to "guest".

 -- Thomas Goirand <zigo@debian.org>  Sat, 15 Jan 2022 11:52:42 +0100