This document outlines the various operations you may want to perform to increase the security of your installation and avoid leak of credentials/key pairs
Your config file should have the following ownership:
- Dedicated user for ma1sd, used to run the software
- Dedicated group for ma1sd, used by other applications to access and read configuration files
Your config file should have the following access:
- Read and write for the ma1sd user
- Read for the ma1sd group
- Nothing for others
This translates into 640
and be applied with chmod 640 /path/to/config/file.yaml
.
The only sensible place is the key store where ma1sd's signing keys are stored. You should therefore limit access to only the ma1sd user, and deny access to anything else.
Your key store should have the following access:
- Read and write for the ma1sd user
- Nothing for the ma1sd group
- Nothing for others
The identity store can either be a file or a directory, depending on your version. v1.4 and higher are using a directory, everything before is using a file.
- If your version is directory-based, you will want to apply chmod
700
on it. - If your version is file-based, you will want to apply chmod
600
on it.