Hello o/

I've verified this by deploying OpenStack Yoga on Jammy via juju then
running sos report on the various machines

## Check ceph obfuscation

ubuntu@stg-reproducer-bryanfraschetti-project-bastion:~$ juju ssh ceph-
rgw/0

# Before enabling proposed
ubuntu@juju-35531a-verif-testing-4:~$ sudo sos report
ubuntu@juju-35531a-verif-testing-4:~$ tar -xf 
/tmp/sosreport-juju-35531a-verif-testing-4-2025-06-06-fnzgjcu.tar.xz
ubuntu@juju-35531a-verif-testing-4:~$ cat 
sosreport-juju-35531a-verif-testing-4-2025-06-06-fnzgjcu/etc/ceph/ceph.conf
Observed that password (rgw keystone admin password) is present in plaintext

# After enabling proposed
ubuntu@juju-35531a-verif-testing-4:~$ sudo add-apt-repository -y "deb 
http://archive.ubuntu.com/ubuntu jammy-proposed main restricted universe 
multiverse"
ubuntu@juju-35531a-verif-testing-4:~$ sudo apt update && sudo apt upgrade -y
ubuntu@juju-35531a-verif-testing-4:~$ sudo sos report
ubuntu@juju-35531a-verif-testing-4:~$ tar -xf 
/tmp/sosreport-juju-35531a-verif-testing-4-2025-06-06-ouwvavz.tar.xz
ubuntu@juju-35531a-verif-testing-4:~$ cat 
sosreport-juju-35531a-verif-testing-4-2025-06-06-ouwvavz/etc/ceph/ceph.conf
[global]
... File contents ...
rgw keystone admin user = s3_swift
rgw keystone admin password = *********
rgw keystone api version = 3
rgw keystone admin domain = service_domain
... Continued file contents

Note that rgw keystone admin password is successfully obfuscated

# Check for existence of auth.log, syslog, kern.log, and ubuntu-
advantage.log

ubuntu@juju-35531a-verif-testing-4:~$ ls -alh 
sosreport-juju-35531a-verif-testing-4-2025-06-06-ouwvavz/var/log/
# Note that I truncated the listing to just those of concern for brevity
total 700K
drwxrwxr-x 7 root   root 4.0K Jun  6 19:03 .
drwxr-xr-x 7 root   root 4.0K Jun  6 18:27 ..
-rw-r----- 1 syslog adm   10K Jun  6 19:04 auth.log
-rw-r----- 1 root   adm   43K Jun  6 18:26 dmesg
-rw-r----- 1 syslog adm   68K Jun  6 19:04 kern.log
-rw-r----- 1 syslog adm  261K Jun  6 19:04 syslog
-rw-r----- 1 root   root  16K Jun  6 19:04 ubuntu-advantage.log

## Check Horizon obfuscation

ubuntu@stg-reproducer-bryanfraschetti-project-bastion:~$ juju ssh
openstack-dashboard/0

# Before enabling proposed
ubuntu@juju-35531a-verif-testing-14:~$ sudo sos report
ubuntu@juju-35531a-verif-testing-14:~$ tar -xf 
/tmp/sosreport-juju-35531a-verif-testing-14-2025-06-06-qfunzxc.tar.xz
ubuntu@juju-35531a-verif-testing-14:~$ egrep "PASSWORD|SECRET_KEY" 
sosreport-juju-35531a-verif-testing-14-2025-06-06-qfunzxc/etc/openstack-dashboard/local_settings.py
Observed that SECRET_KEY, PASSWORD, and EMAIL_HOST_PASSWORD are not obfuscated

# After enabling proposed
ubuntu@juju-35531a-verif-testing-14:~$ sudo add-apt-repository -y "deb 
http://archive.ubuntu.com/ubuntu jammy-proposed main restricted universe 
multiverse"
ubuntu@juju-35531a-verif-testing-14:~$ sudo apt update && sudo apt upgrade -y
ubuntu@juju-35531a-verif-testing-14:~$ sudo sos report
ubuntu@juju-35531a-verif-testing-14:~$ sudo tar -xf 
/tmp/sosreport-juju-35531a-verif-testing-14-2025-06-06-lrqqhif.tar.xz
ubuntu@juju-35531a-verif-testing-14:~$ egrep "PASSWORD|SECRET_KEY" 
sosreport-juju-35531a-verif-testing-14-2025-06-06-lrqqhif/etc/openstack-dashboard/local_settings.py
SECRET_KEY = *********
        'PASSWORD': *********
EMAIL_HOST_PASSWORD = *********

Note that all are now successfully obfuscated

# Check for auth.log, syslog, kern.log, and ubuntu-advantage.log

ubuntu@juju-35531a-verif-testing-14:~$ ls -alh 
sosreport-juju-35531a-verif-testing-14-2025-06-06-lrqqhif/var/log/
# Note that I truncated the listing to just those of concern for brevity
total 804K
drwxrwxr-x 7 root   root 4.0K Jun  6 19:30 .
drwxr-xr-x 7 root   root 4.0K Jun  6 18:27 ..
-rw-r----- 1 syslog adm   18K Jun  6 19:31 auth.log
-rw-r----- 1 root   adm   43K Jun  6 18:26 dmesg
-rw-r----- 1 syslog adm   68K Jun  6 19:31 kern.log
-rw-r----- 1 syslog adm  276K Jun  6 19:31 syslog
-rw-r----- 1 root   root  16K Jun  6 19:31 ubuntu-advantage.log

I will repeat this testing on noble and oracular

-- 
You received this bug notification because you are a member of
Debcrafters packages, which is subscribed to sos in Ubuntu.
https://bugs.launchpad.net/bugs/2101134

Title:
  [sru] Obfuscation/Collection issues in sosreport/sos 4.8.2

Status in Ubuntu Pro:
  New
Status in Ubuntu Pro 20.04 series:
  New
Status in sos package in Ubuntu:
  Fix Released
Status in sosreport source package in Focal:
  Won't Fix
Status in sosreport source package in Jammy:
  Fix Committed
Status in sosreport source package in Noble:
  Fix Committed
Status in sosreport source package in Oracular:
  Fix Committed
Status in sos source package in Plucky:
  Fix Released

Bug description:
  [ Impact ]

  When doing SRU for sos 4.8.2 we encountered obfuscation issues,
  although not a regression at the time, it was still an issue that had
  been present for a while

  1. So, these passwords would be fully visible to the end support personnel 
and therefore leaked passwords.
  2. Some logs had not longer being collected which are essential for 
debugging, such as auth.log, syslog and kern.log in /var/log
  3. The ubuntu plugin was no longer collecting Ubuntu Pro details due to the 
package name for ubuntu-pro, and hence essential for supportability for 
customers that have Ubuntu Pro
  4. autopkgtest for focal rendered a new issue, was not necessarily an issue, 
but the script was catching it

  [ Test Plan ]

  Test 1. Deploy a openstack simple cloud, and run the sos report, check to see 
if passwords are obfuscated in configuration file for radosgw and horizon 
config in particular /etc/ceph/ceph.conf and /etc/horizon/local_settings.py
  Test 2. Deploy all series, and ensure the the auth.log, syslog and kerne.log 
are collected from /var/log.
  Test 3. On the same hosts as Test 2, ensure that /var/log/ubuntu-advantage 
logs are collected
  Test 4. Ensure to do autopkgtest via PPA for arm64 before going for SRU, and 
ensure all is good before submitting

  The majority of the testing will follow ythe process detailed in the
  following URL:

  https://wiki.ubuntu.com/SosreportUpdates

  [ Where problems could occur ]

  1. The corresponding files are not obfuscated, and we need to update the 
patches.
  2. The files that have been specified are not being collected.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-pro/+bug/2101134/+subscriptions


-- 
Mailing list: https://launchpad.net/~debcrafters-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~debcrafters-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to