- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Date | Description |
13 Jan 2023 | Initial publish |
16 Jan 2023 | Updated rpm_check script v1.1.0, edits for clarity |
17 Jan 2023 | Updated rpm_check script v1.2.0, clearer identify and remedy steps |
3 Feb 2023 | Clarify which Agents 5 versions are signed with the affected key |
60A389A44A0C32BAE3C03F0B069B56F54172A230
.On January 4th, 2023, Datadog was notified by CircleCI that they were investigating a security incident that may have led to leaking of stored secrets. Datadog identified a single secret stored in CircleCI that could theoretically be misused by a potential attacker, an old RPM GNU Privacy Guard (GPG) private signing key and its passphrase. This page provides information about the implications of the potential leak, actions you should take on your hosts, and the measures Datadog is taking to mitigate any risks to our customers.
The impacted RPM GPG signing key has the fingerprint 60A389A44A0C32BAE3C03F0B069B56F54172A230
, and is accessible in our signing keys location. This key was historically used to sign:
datadog-agent
package)datadog-dogstatsd
package)The incident can affect hosts running RPM-based Linux distributions, including RHEL, CentOS, Rocky Linux, AlmaLinux, Amazon Linux, SUSE/SLES, and Fedora. Hosts running other operating systems such as macOS, Windows, Debian, and Ubuntu, and Container Agents are not affected.
Before you start, if you have a large infrastructure, prioritize your search for hosts that trust the key. Because of the variety of ways packages can be installed and updated over time, Datadog recommends you check all RPM-based Linux hosts with a Datadog package installed. To help you prioritize which hosts to check first, consider the following guidance. The following scenarios are highly likely to be affected:
On RPM-based Linux hosts, the following scenarios are unlikely to be affected, but still worth checking your hosts:
The following scenarios are not affected:
Check each host to see if it trusts the affected key from either the RPM database or the Datadog repo file, or both:
Check the RPM database by running the following command:
$ rpm -q gpg-pubkey-4172a230-55dd14f6
The host trusts the key and requires action if the command runs successfully and prints gpg-pubkey-4172a230-55dd14f6
.The host does not trust the key in the RPM database if the command fails, exiting with a non-0 exit code and outputting a message like package gpg-pubkey-4172a230-55dd14f6 is not installed
.
Check the Datadog repo file. The default location for the file is:
/etc/yum.repos.d/datadog.repo
/etc/zypp/repos.d/datadog.repo
If the repo file mentions DATADOG_RPM_KEY.public
under the gpgkey
entry as shown in the following examples, the host trusts the affected key and requires action:
https://s3.amazonaws.com/public-signing-keys/DATADOG_RPM_KEY.public
https://keys.datadoghq.com/DATADOG_RPM_KEY.public
https://s3.amazonaws.com/yum.datadoghq.com/DATADOG_RPM_KEY.public
https://yum.datadoghq.com/DATADOG_RPM_KEY.public
If either one or both of these is identified as trusting the key, take the actions listed in the following sections to secure the affected host. If neither of these is identified as trusting the key, no further action is needed.
Ensure that your hosts stop trusting the affected key. If the previous steps indicated that a host trusts the key, follow these steps:
If you use configuration automation tools or plugins, such as the Ansible Datadog role, update them to the latest version listed in What Datadog is doing.
Remaining on older versions of these automation tools or plugins might reverse your remediation efforts. If you can’t yet update to the new fixed versions, add the manual key deletion steps (step 3 and 4) to your automation tool runbooks, and ensure these run after the Datadog tools and plugins in your runbook order.
For hosts that are set up using the official Datadog install scripts, run the latest version of the install script to untrust the key and provision the updated repo files.
If running rpm -q gpg-pubkey-4172a230-55dd14f6
still detects the key, delete the key from the RPM database and stop trusting it by running the following command:
$ sudo rpm --erase gpg-pubkey-4172a230-55dd14f6
If DATADOG_RPM_KEY.public
is still listed in the repo file, delete the key by removing the gpgkey
line that ends with DATADOG_RPM_KEY.public
. If this is the only gpgkey
entry in your repo file, replace it with https://keys.datadoghq.com/DATADOG_RPM_KEY_CURRENT.public
. Read more in the section Implications of no longer trusting the affected key.
Out of an abundance of caution, verify that Datadog built the packages signed by the affected key on the affected hosts by running this script:
$ curl -o /tmp/rpm_check.sh https://docs.datadoghq.com/resources/sh/rpm_check.sh && chmod +x /tmp/rpm_check.sh
$ /tmp/rpm_check.sh
This script verifies that any installed Datadog packages signed by the affected key were built by Datadog and searches for any packages signed by the affected key that weren’t built by Datadog.
If the output contains lines that start with [ ERROR ]
report these to Datadog Support along with the full script output.
If the host in question uses Agent 7, there is no implication. Agent 7 packages were never signed with the affected key.
Hosts can no longer install:
datadog-dogstatsd
packages). Upgrade to Standalone DogStatsD 7.24.0+.We released a new Agent 5 RPM for CentOS/RHEL, 5.32.9-1, signed with the current RPM signing key, C6559B690CA882F023BDF3F63F4D1729FD4BF915
. The RPM is available through the Agent 5 RPM repository.
We released new versions of Agent installation methods to ensure they make hosts safe by explicitly removing the affected key from the RPM database and the Datadog repo file: