Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fork to unprivileged user after loading certificates #692

Open
drkhsh opened this issue Aug 25, 2017 · 5 comments
Open

Fork to unprivileged user after loading certificates #692

drkhsh opened this issue Aug 25, 2017 · 5 comments
Labels
Milestone

Comments

@drkhsh
Copy link

drkhsh commented Aug 25, 2017

Feature proposal: Radicale should start as root, load SSL certificates (only readable as root) and fork to an unprivileged user ("radicale" by default, configurable via "user" option in the config file) for security reasons afterwards.

@Unrud Unrud added the feature label Aug 25, 2017
@rathann
Copy link

rathann commented May 2, 2018

Same here. I'd like to use the same certificate/private key pair as for other services running on the host.

@daks
Copy link

daks commented May 9, 2018

In my point of view TLS certificates should not be managed by Radicale, but by a webserver placed in front of Radicale like Nginx or Apache.

my 2 cents.

@drkhsh
Copy link
Author

drkhsh commented May 9, 2018

In my point of view TLS certificates should not be managed by Radicale, but by a webserver placed in front of Radicale like Nginx or Apache.

That unnecessary complicates a setup by adding another webserver. Additionally the function for TLS is there anyway, so adding a function to fork to an unprivileged user after loading the private key as root is justified.

@daks
Copy link

daks commented May 9, 2018

@drkhsh in fact, if the code is already here, dropping root privilege is the way to go.

But I still think a better way would be to not handle ssl/tls in radicale when webservers are already better at doing it, and (probably) more secure. And document how to use radicale like this.

@Tntdruid
Copy link

Tntdruid commented May 14, 2018

I run it as service, using https://github.com/Neilpang/acme.sh for cert whit dns mode and copy the cert to /etc/radicale then service radicale restart. Does the same on renew.

@pbiering pbiering added this to the 4.x milestone Mar 2, 2024
@pbiering pbiering added the prio:low low priority label Oct 15, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

6 participants