You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
155216: cli, security: disable root user and auth changes for debug zip user r=souravcrl a=souravcrl
**cli, security: add --disallow-root-login flag to disable root user**
We introduce a `--disallow-root-login` flag which now disables root user
from access to both sql and rpc apis.
**rpc: enable debugzip user for privileged access**
This commit introduces support for the debug_user certificate
as a privileged user for RPC authentication, similar to the existing
root and node users. The debug_user is specifically designed
for collecting debug information (debug zip) and requires privileged
access to serverpb admin and status endpoints.
Modified `pkg/rpc/auth.go` to allow `debug_user` scope in
`checkRootOrNodeInScope()`, treating it as a privileged user
alongside root and node. Enhanced `pkg/rpc/auth_test.go` with
comprehensive test cases for `debug_user` authentication and
authorization across various scenarios.
The `debug_user` is not subject to the disallow-root-login flag and
should always be allowed for debugging purposes.
Release note (security update):
We will be adding a new flag `--disallow-root-login` to the cockroach start
command to explicitly allowcrestricting the root user from logging into the system.
This change affects the [unstated, unchangeable root access rule](https://www.cockroachlabs.com/docs/stable/security-reference/authentication#the-unstated-unchangeable-root-access-rule) as part of
compliance requirements. This flag is currently experimental and also needs an
additional user setup for debug zip collection as disabling the root user affects
the debug zip service. We currently do not validate if this user is set up or not.
Note: Care must be taken to ensure none of the certificates that are in use by
the cluster or the SQL/RPC clients have a root in the SAN fields since the flag
will block access to that client.
A new `debug_user` certificate can now be used for privileged RPC access
to collect debug information. The `debug_user` must be created manually using
the `CREATE USER` command and can be audited using the `SHOW USERS` command.
This user has privileged access to `serverpb` admin and status endpoints required for
debug zip collection.
Fixes: #150845, #152817
Epic: CRDB-49035
Co-authored-by: souravcrl <[email protected]>
0 commit comments