summaryrefslogtreecommitdiff
path: root/rt/docs/security.pod
blob: 7120e389a7f32c63451ce1ac165ec36db77c3f7f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
=head1 RT Security

=head2 Reporting security vulnerabilities in RT

If you believe you've discovered a security issue in RT, please send an
email to <security@bestpractical.com> with a detailed description of the
issue, and a secure means to respond to you (such as your PGP public
key).

More information is available at L<http://bestpractical.com/security/>.


=head2 RT's security process

After a security vulnerability is reported to Best Practical and
verified, we attempt to resolve it in as timely a fashion as possible.
Best Practical support customers will be notified before we disclose the
information to the public.  All security announcements will be sent to
C<rt-announce@bestpractical.com> and posted to the community forum at
L<https://forum.bestpractical.com>

As the tests for security vulnerabilities are often nearly identical to
working exploits, sensitive tests will be embargoed for a period of six
months before being added to the public RT repository.


=head2 Security tips for running RT

=over

=item *

Protect your RT installation by making it only accessible via SSL.  This
will protect against users' passwords being sniffed as they go over the
wire, as well as helping prevent phishing attacks.

You should use a certificate signed by a reputable authority, or at very
least a certificate signed by a consistent local CA, which you configure
your local systems to trust.  If your SSL certificate is self-signed, it
does little to prevent phishing, as users are trained to accept the
unauthorized certificate.  See also the C<--no-verify-ssl> flag to
C<rt-mailgate>.

=item *

Be sure to change the password for the C<root> user of RT.  The default
password is C<password>.  This can be changed via the RT web interface
at: Preferences > About me


=item *

Be sure to protect your F<RT_SiteConfig.pm> file if it contains database
credentials or other sensitive information.  This file only needs to be
readable by RT and your web server.  One way to accomplish this is to
make the file readable only by root and the group that RT runs as, and
then make sure your web server is a member of that group.  Advanced
configuration may be required if other users have the ability to run
CGIs or access the server where RT is running.


=item *

Be sure to protect your database.  If it does not need to talk to the
world, then don't allow it to listen for remote connections.  With MySQL
this can be accomplished via C<skip-networking>.  If you use your
database for other things and must allow remote connections, be sure to
use a strong, hard to guess password for RT.


=item *

Apache, lighttpd, and most other web servers support name based virtual
hosts.  When possible, configure RT as a name based virtual host to
raise the bar against DNS rebinding attacks.  If you see RT when you
visit http://your.servers.ipaddress.here, it means you are likely not
getting this additional protection.


=item *

Use groups to organize RT permissions.  Granting permissions per-user
makes them, in general, more easily over-granted and forgotten, and more
likely to diverge from each other, forming a maintenance hassle.

=back

=cut