This section will document security issues and fixes for those issues.
A umask setting of
0027 in the shell startup file, typically
~/.bashrc when using the bash shell, will cause installation to fail because directories created by root will be inaccessible to the user
With a umask setting of
0027, when the initial configuration is being created, ecconfigd is started, but the Apache instance will not start. You will see output such as the following:
shell> CFG-07961 failed to stat '/opt/msys/etc/installer/ecelerity.d/': Permission denied Reconfigure failed. Global configuration error.
This is also true of any files that are created as the root user under the
To resolve this use a more permissive mask, for example
Another option is to
chown ecuser:ecuser all new configuration files, or make them world readable. Likewise for directories.
If you get the permissions wrong, then you will also not be able to log in to the web UI or use the ecconfigd command.
The POODLE (Padding Oracle On Downgraded Legacy Encryption) vulnerability attacks the TLS protocol and forces clients to downgrade to the SSLv3, which has no known secure cipher suites available. This allows an attacker to read information encrypted with this version of the protocol in plain text. Another part of the POODLE attack is exploiting weaknesses in the CBC mode of operation.
If you access the REST APIs via NGINX, enable GNUTLS in the TLS_Engine and disable SSLv3 to protect SMTP traffic. To do this, set the tls_ciphers configuration option to disable SSLv3 in your
TLS_Ciphers = "NORMAL:-VERS-SSL3.0"
For more information, see the GNUTLS website.
To fix this vulnerability in OpenSSL, make sure you are running Momentum 18.104.22.168 or later and set the tls_protocols configuration option to disable SSLv3 in your
TLS_Protocols = "+ALL:-SSLv3"