<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: oneagent file permissions in Open Q&amp;A</title>
    <link>https://community.dynatrace.com/t5/Open-Q-A/oneagent-file-permissions/m-p/54099#M2749</link>
    <description>&lt;P&gt;hi Chris,&lt;/P&gt;&lt;P&gt;currently it will not be possible to lock all those directories down, as it's not possible to know upfront which processes the OneAgent will be injected into and which users those processes are running as.&lt;/P&gt;&lt;P&gt;the "process" directory is the easiest example: this has of course to be world writeable to allow every process to write to this directory.&lt;/P&gt;&lt;P&gt;so for some technologies, e.g. Java, you might be able to limit the permissions if you know exactly upfront which user/group *all* your monitored Java processes are running as.&lt;/P&gt;&lt;P&gt;but as I said, you probably won't be able to lock down all directories.&lt;/P&gt;&lt;P&gt;also please keep in mind: those are "only" log directories and we take care to not place any sensitive information in those log files. also you cannot compromise the system by modifying content inside those directories.&lt;/P&gt;&lt;P&gt;HTH,&lt;BR /&gt;Christian&lt;/P&gt;</description>
    <pubDate>Mon, 12 Feb 2018 09:50:39 GMT</pubDate>
    <dc:creator>c_schwarzbauer</dc:creator>
    <dc:date>2018-02-12T09:50:39Z</dc:date>
    <item>
      <title>oneagent file permissions</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/oneagent-file-permissions/m-p/54098#M2748</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;We're using the latest version of oneagent on RHEL servers. We're also pushing these servers to be CIS hardened. Nessus is picking up several '777'd directories - which makes it unhappy;&lt;/P&gt;&lt;P&gt;[root@ewoksaglprdap39 log]# ls -al&lt;/P&gt;&lt;P&gt;total 24&lt;/P&gt;&lt;P&gt;drwxrwxrwt. 12 root dtuser  193 Jan 30 02:41 .&lt;/P&gt;&lt;P&gt;drwxr-xr-x.  7 root root  98&lt;BR /&gt;Feb  1 22:48 ..&lt;/P&gt;&lt;P&gt;drwxrwxrwx.  3 root dtuser  33 Feb  5&lt;BR /&gt;13:18 crashreports&lt;/P&gt;&lt;P&gt;drwxrwxr-x.  2 root dtuser  119 Feb  1 22:47&lt;BR /&gt;installer&lt;/P&gt;&lt;P&gt;drwxrwxrwx.  2 root dtuser 4096 Jan 25 16:44 java&lt;/P&gt;&lt;P&gt;drwxrwxr-x.  2 root dtuser 4096 Feb  1 22:48 loganalytics&lt;/P&gt;&lt;P&gt;drwxrwxrwx.  2 root dtuser  6&lt;BR /&gt;Dec  8 13:27 memorydump&lt;/P&gt;&lt;P&gt;drwxrwxr-x.  2 root dtuser 4096 Feb  1 22:48&lt;BR /&gt;network&lt;/P&gt;&lt;P&gt;drwxrwxr-x.  2 root dtuser 4096 Feb  6 16:55 os&lt;/P&gt;&lt;P&gt;drwxrwxrwx.  2 root dtuser 4096 Feb  1 22:49&lt;BR /&gt;plugin&lt;/P&gt;&lt;P&gt;drwxrwxrwx.  2 root dtuser  80 Feb  1&lt;BR /&gt;22:48 process&lt;/P&gt;&lt;P&gt;-rw-rw-rw-.  1 root root  1494 Feb  5&lt;BR /&gt;13:18 ruxitdumpproc.log&lt;/P&gt;&lt;P&gt;drwxrwxrwx.  3 root dtuser  33 Feb  6&lt;BR /&gt;02:42 supportalerts&lt;/P&gt;&lt;P&gt;[root@ewoksaglprdap39 log]# pwd&lt;/P&gt;&lt;P&gt;/opt/dynatrace/oneagent/log&lt;/P&gt;&lt;P&gt;Does anyone have any experience in locking these down and still having a working application afterwards?&lt;/P&gt;&lt;P&gt;Thanks in Advance,&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2018 09:06:13 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/oneagent-file-permissions/m-p/54098#M2748</guid>
      <dc:creator>chris_kirby</dc:creator>
      <dc:date>2018-02-08T09:06:13Z</dc:date>
    </item>
    <item>
      <title>Re: oneagent file permissions</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/oneagent-file-permissions/m-p/54099#M2749</link>
      <description>&lt;P&gt;hi Chris,&lt;/P&gt;&lt;P&gt;currently it will not be possible to lock all those directories down, as it's not possible to know upfront which processes the OneAgent will be injected into and which users those processes are running as.&lt;/P&gt;&lt;P&gt;the "process" directory is the easiest example: this has of course to be world writeable to allow every process to write to this directory.&lt;/P&gt;&lt;P&gt;so for some technologies, e.g. Java, you might be able to limit the permissions if you know exactly upfront which user/group *all* your monitored Java processes are running as.&lt;/P&gt;&lt;P&gt;but as I said, you probably won't be able to lock down all directories.&lt;/P&gt;&lt;P&gt;also please keep in mind: those are "only" log directories and we take care to not place any sensitive information in those log files. also you cannot compromise the system by modifying content inside those directories.&lt;/P&gt;&lt;P&gt;HTH,&lt;BR /&gt;Christian&lt;/P&gt;</description>
      <pubDate>Mon, 12 Feb 2018 09:50:39 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/oneagent-file-permissions/m-p/54099#M2749</guid>
      <dc:creator>c_schwarzbauer</dc:creator>
      <dc:date>2018-02-12T09:50:39Z</dc:date>
    </item>
    <item>
      <title>Re: oneagent file permissions</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/oneagent-file-permissions/m-p/54100#M2750</link>
      <description>&lt;P&gt;Thanks Christian, appreciate you taking the time to reply. I'm going to recommend we waiver this, I'm concerned that if we start locking down directories performance will take a hit - leading to more debug time. &lt;/P&gt;</description>
      <pubDate>Mon, 12 Feb 2018 14:40:33 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/oneagent-file-permissions/m-p/54100#M2750</guid>
      <dc:creator>chris_kirby</dc:creator>
      <dc:date>2018-02-12T14:40:33Z</dc:date>
    </item>
  </channel>
</rss>

