-
Notifications
You must be signed in to change notification settings - Fork 586
Open
Description
User story: Cleaner was applied to a sosreport. Since the sosreport was taken from a RedHat distro, /etc/pki/consumer/cert.pem
was collected by dnf
plugin. The certificate file contains plain FQDNs. Example from my system (some.domain
was manually obfuscated by myself):
# openssl x509 -in /etc/pki/consumer/cert.pem -text
..
Issuer: C=US, ST=North Carolina, L=Raleigh, O=Katello, OU=SomeOrgUnit, CN=pmoravec-sat615.some.domain.redhat.com
..
X509v3 Subject Alternative Name:
DirName:/O=RedHat/CN=5b9d4751-2720-42fa-846f-7bdd62074ab5, DirName:/CN=pmoravec-rhel9.some.domain.redhat.com
..
#
The file is not binary, so cleaner does not remove it. But the hostnames are straighforwardly "encoded" within the file.
Can be there some solution, at all? I ruled out a few ideas already..
Imho the best we can do is cleaner raising a warning "hey, I leave untouched a certificate that may contain sensitive info".
Metadata
Metadata
Assignees
Labels
No labels