debcrafters-packages team mailing list archive
-
debcrafters-packages team
-
Mailing list archive
-
Message #01693
[Bug 2101134] Re: [sru] Obfuscation/Collection issues in sosreport/sos 4.8.2
Hello o/
I've verified this by deploying OpenStack Yoga on Jammy via juju then
running sos report on the various machines
## Check ceph obfuscation
ubuntu@stg-reproducer-bryanfraschetti-project-bastion:~$ juju ssh ceph-
rgw/0
# Before enabling proposed
ubuntu@juju-35531a-verif-testing-4:~$ sudo sos report
ubuntu@juju-35531a-verif-testing-4:~$ tar -xf /tmp/sosreport-juju-35531a-verif-testing-4-2025-06-06-fnzgjcu.tar.xz
ubuntu@juju-35531a-verif-testing-4:~$ cat sosreport-juju-35531a-verif-testing-4-2025-06-06-fnzgjcu/etc/ceph/ceph.conf
Observed that password (rgw keystone admin password) is present in plaintext
# After enabling proposed
ubuntu@juju-35531a-verif-testing-4:~$ sudo add-apt-repository -y "deb http://archive.ubuntu.com/ubuntu jammy-proposed main restricted universe multiverse"
ubuntu@juju-35531a-verif-testing-4:~$ sudo apt update && sudo apt upgrade -y
ubuntu@juju-35531a-verif-testing-4:~$ sudo sos report
ubuntu@juju-35531a-verif-testing-4:~$ tar -xf /tmp/sosreport-juju-35531a-verif-testing-4-2025-06-06-ouwvavz.tar.xz
ubuntu@juju-35531a-verif-testing-4:~$ cat sosreport-juju-35531a-verif-testing-4-2025-06-06-ouwvavz/etc/ceph/ceph.conf
[global]
... File contents ...
rgw keystone admin user = s3_swift
rgw keystone admin password = *********
rgw keystone api version = 3
rgw keystone admin domain = service_domain
... Continued file contents
Note that rgw keystone admin password is successfully obfuscated
# Check for existence of auth.log, syslog, kern.log, and ubuntu-
advantage.log
ubuntu@juju-35531a-verif-testing-4:~$ ls -alh sosreport-juju-35531a-verif-testing-4-2025-06-06-ouwvavz/var/log/
# Note that I truncated the listing to just those of concern for brevity
total 700K
drwxrwxr-x 7 root root 4.0K Jun 6 19:03 .
drwxr-xr-x 7 root root 4.0K Jun 6 18:27 ..
-rw-r----- 1 syslog adm 10K Jun 6 19:04 auth.log
-rw-r----- 1 root adm 43K Jun 6 18:26 dmesg
-rw-r----- 1 syslog adm 68K Jun 6 19:04 kern.log
-rw-r----- 1 syslog adm 261K Jun 6 19:04 syslog
-rw-r----- 1 root root 16K Jun 6 19:04 ubuntu-advantage.log
## Check Horizon obfuscation
ubuntu@stg-reproducer-bryanfraschetti-project-bastion:~$ juju ssh
openstack-dashboard/0
# Before enabling proposed
ubuntu@juju-35531a-verif-testing-14:~$ sudo sos report
ubuntu@juju-35531a-verif-testing-14:~$ tar -xf /tmp/sosreport-juju-35531a-verif-testing-14-2025-06-06-qfunzxc.tar.xz
ubuntu@juju-35531a-verif-testing-14:~$ egrep "PASSWORD|SECRET_KEY" sosreport-juju-35531a-verif-testing-14-2025-06-06-qfunzxc/etc/openstack-dashboard/local_settings.py
Observed that SECRET_KEY, PASSWORD, and EMAIL_HOST_PASSWORD are not obfuscated
# After enabling proposed
ubuntu@juju-35531a-verif-testing-14:~$ sudo add-apt-repository -y "deb http://archive.ubuntu.com/ubuntu jammy-proposed main restricted universe multiverse"
ubuntu@juju-35531a-verif-testing-14:~$ sudo apt update && sudo apt upgrade -y
ubuntu@juju-35531a-verif-testing-14:~$ sudo sos report
ubuntu@juju-35531a-verif-testing-14:~$ sudo tar -xf /tmp/sosreport-juju-35531a-verif-testing-14-2025-06-06-lrqqhif.tar.xz
ubuntu@juju-35531a-verif-testing-14:~$ egrep "PASSWORD|SECRET_KEY" sosreport-juju-35531a-verif-testing-14-2025-06-06-lrqqhif/etc/openstack-dashboard/local_settings.py
SECRET_KEY = *********
'PASSWORD': *********
EMAIL_HOST_PASSWORD = *********
Note that all are now successfully obfuscated
# Check for auth.log, syslog, kern.log, and ubuntu-advantage.log
ubuntu@juju-35531a-verif-testing-14:~$ ls -alh sosreport-juju-35531a-verif-testing-14-2025-06-06-lrqqhif/var/log/
# Note that I truncated the listing to just those of concern for brevity
total 804K
drwxrwxr-x 7 root root 4.0K Jun 6 19:30 .
drwxr-xr-x 7 root root 4.0K Jun 6 18:27 ..
-rw-r----- 1 syslog adm 18K Jun 6 19:31 auth.log
-rw-r----- 1 root adm 43K Jun 6 18:26 dmesg
-rw-r----- 1 syslog adm 68K Jun 6 19:31 kern.log
-rw-r----- 1 syslog adm 276K Jun 6 19:31 syslog
-rw-r----- 1 root root 16K Jun 6 19:31 ubuntu-advantage.log
I will repeat this testing on noble and oracular
--
You received this bug notification because you are a member of
Debcrafters packages, which is subscribed to sos in Ubuntu.
https://bugs.launchpad.net/bugs/2101134
Title:
[sru] Obfuscation/Collection issues in sosreport/sos 4.8.2
Status in Ubuntu Pro:
New
Status in Ubuntu Pro 20.04 series:
New
Status in sos package in Ubuntu:
Fix Released
Status in sosreport source package in Focal:
Won't Fix
Status in sosreport source package in Jammy:
Fix Committed
Status in sosreport source package in Noble:
Fix Committed
Status in sosreport source package in Oracular:
Fix Committed
Status in sos source package in Plucky:
Fix Released
Bug description:
[ Impact ]
When doing SRU for sos 4.8.2 we encountered obfuscation issues,
although not a regression at the time, it was still an issue that had
been present for a while
1. So, these passwords would be fully visible to the end support personnel and therefore leaked passwords.
2. Some logs had not longer being collected which are essential for debugging, such as auth.log, syslog and kern.log in /var/log
3. The ubuntu plugin was no longer collecting Ubuntu Pro details due to the package name for ubuntu-pro, and hence essential for supportability for customers that have Ubuntu Pro
4. autopkgtest for focal rendered a new issue, was not necessarily an issue, but the script was catching it
[ Test Plan ]
Test 1. Deploy a openstack simple cloud, and run the sos report, check to see if passwords are obfuscated in configuration file for radosgw and horizon config in particular /etc/ceph/ceph.conf and /etc/horizon/local_settings.py
Test 2. Deploy all series, and ensure the the auth.log, syslog and kerne.log are collected from /var/log.
Test 3. On the same hosts as Test 2, ensure that /var/log/ubuntu-advantage logs are collected
Test 4. Ensure to do autopkgtest via PPA for arm64 before going for SRU, and ensure all is good before submitting
The majority of the testing will follow ythe process detailed in the
following URL:
https://wiki.ubuntu.com/SosreportUpdates
[ Where problems could occur ]
1. The corresponding files are not obfuscated, and we need to update the patches.
2. The files that have been specified are not being collected.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-pro/+bug/2101134/+subscriptions