@@ -2691,6 +2691,18 @@ Logged at debug log level 10.
26912691This debug messages is issued when the Command HTTP listener, listening
26922692at the given address and port, has begun to shutdown.
26932693
2694+ COMMAND_HTTP_SOCKET_SECURITY_WARNING
2695+ ====================================
2696+
2697+ .. code-block:: text
2698+
2699+ command socket configuration is NOT SECURE: %1
2700+
2701+ This warning message is issued when security enforcement is disabled
2702+ and command socket configuration does not use HTTPS/TLS or baseic HTTP
2703+ authentication. The server will still use the socket as configured but
2704+ is warning that doing so may pose a security risk.
2705+
26942706COMMAND_PROCESS_ERROR1
26952707======================
26962708
@@ -2880,6 +2892,30 @@ COMMAND_SOCKET_WRITE_FAIL
28802892This error message indicates that an error was encountered while
28812893attempting to send a response to the command socket.
28822894
2895+ COMMAND_UNIX_SOCKET_PATH_SECURITY_WARNING
2896+ =========================================
2897+
2898+ .. code-block:: text
2899+
2900+ unix socket path is NOT SECURE: %1
2901+
2902+ This warning message is issued when security enforcement is disabled
2903+ and the path specified for a control channel unix socket-name does
2904+ not comply with the supported path. The server will still use the
2905+ specified path but is warning that doing so may pose a security risk.
2906+
2907+ COMMAND_UNIX_SOCKET_PERMISSIONS_SECURITY_WARNING
2908+ ================================================
2909+
2910+ .. code-block:: text
2911+
2912+ unix socket permissions are NOT SECURE: %1
2913+
2914+ This warning message is issued when security enforcement is disabled
2915+ and the path specified for a control channel unix socket-name does
2916+ not have the required socket permissions. The server will still use the
2917+ specified path but is warning that doing so may pose a security risk.
2918+
28832919COMMAND_WATCH_SOCKET_CLEAR_ERROR
28842920================================
28852921
@@ -3508,6 +3544,19 @@ DCTL_INIT_PROCESS_FAIL
35083544This error message is issued if the controller could not initialize the
35093545application and will exit.
35103546
3547+ DCTL_LOG_PATH_SECURITY_WARNING
3548+ ==============================
3549+
3550+ .. code-block:: text
3551+
3552+ Log output path specified is NOT SECURE: %1
3553+
3554+ This warning message is issued when security enforcement is
3555+ disabled and the output path specified for a given logger does
3556+ not comply with the supported path. The server will still
3557+ use the specified path but is warning that doing so may pose a
3558+ security risk.
3559+
35113560DCTL_NOT_RUNNING
35123561================
35133562
@@ -3567,6 +3616,18 @@ The controller has encountered a fatal error while running the
35673616application and is terminating. The reason for the failure is
35683617included in the message.
35693618
3619+ DCTL_ROOT_USER_SECURITY_WARNING
3620+ ===============================
3621+
3622+ .. code-block:: text
3623+
3624+ %1 running as root user!
3625+
3626+ This warning is emitted when the server is running as a root user.
3627+ While the server will function fully, this mode of operation may
3628+ expose your environment to security vulnerabilities and should
3629+ only be used after careful consideration.
3630+
35703631DCTL_RUN_PROCESS
35713632================
35723633
@@ -5829,6 +5890,18 @@ supplied its hostname. The first argument includes the client and the
58295890transaction identification information. The second argument holds the
58305891generated hostname.
58315892
5893+ DHCP4_ROOT_USER_SECURITY_WARNING
5894+ ================================
5895+
5896+ .. code-block:: text
5897+
5898+ kea-dhcp4 running as root user!
5899+
5900+ This warning is emitted when kea-dhcp4 is running as a root user.
5901+ While the server will function fully, this mode of operation may
5902+ expose your environment to security vulnerabilities and should
5903+ only be used after careful consideration.
5904+
58325905DHCP4_SECURITY_CHECKS_DISABLED
58335906==============================
58345907
@@ -8187,6 +8260,18 @@ identification information. The second and third argument contains the
81878260packet name and type respectively. The fourth argument contains detailed
81888261packet information.
81898262
8263+ DHCP6_ROOT_USER_SECURITY_WARNING
8264+ ================================
8265+
8266+ .. code-block:: text
8267+
8268+ kea-dhcp6 running as root user!
8269+
8270+ This warning is emitted when kea-dhcp6 is running as a root user.
8271+ While the server will function fully, this mode of operation may
8272+ expose your environment to security vulnerabilities and should
8273+ only be used after careful consideration
8274+
81908275DHCP6_SECURITY_CHECKS_DISABLED
81918276==============================
81928277
@@ -9964,6 +10049,18 @@ testing but should not be enabled in normal circumstances. Non-persistence
996410049mode is enabled when 'persist4=no persist6=no' parameters are specified
996510050in the database access string.
996610051
10052+ DHCPSRV_MEMFILE_PATH_SECURITY_WARNING
10053+ =====================================
10054+
10055+ .. code-block:: text
10056+
10057+ Lease file path specified is NOT SECURE: %1
10058+
10059+ This warning message is issued when security enforcement is
10060+ disabled and the lease file path specified for does not comply
10061+ with the supported path. The server will still use the specified
10062+ path but is warning that doing so may pose a security risk.
10063+
996710064DHCPSRV_MEMFILE_READ_HWADDR_FAIL
996810065================================
996910066
@@ -11454,6 +11551,18 @@ message but the attempt to send it suffered an unexpected error. This is most
1145411551likely a programmatic error, rather than a communications issue. Some or all
1145511552of the DNS updates requested as part of this request did not succeed.
1145611553
11554+ DHCP_DDNS_TSIG_SECRET_SECURITY_WARNING
11555+ ======================================
11556+
11557+ .. code-block:: text
11558+
11559+ use of clear text TSIG 'secret' is NOT SECURE: %1
11560+
11561+ This warning message is issued when security enforcement is disabled
11562+ and TSIG key configuration uses clear text 'secret' rather
11563+ than 'secret-file'. The server will still use the key as configured
11564+ but is warning that doing so may pose a security risk.
11565+
1145711566DHCP_DDNS_UDP_SENDER_WATCH_SOCKET_CLOSE_ERROR
1145811567=============================================
1145911568
@@ -14489,6 +14598,19 @@ This is most likely due to the installation of a new version of Kea
1448914598without rebuilding the hook library. A rebuild and re-install of the
1449014599library should fix the problem in most cases.
1449114600
14601+ HOOKS_LIBPATH_SECURITY_WARNING
14602+ ==============================
14603+
14604+ .. code-block:: text
14605+
14606+ Library path specified is NOT SECURE: %1
14607+
14608+ This warning message is issued when security enforcement is
14609+ disabled and the library path specified for a given hook library
14610+ does not comply with the supported path. The server will still load
14611+ the hook library but is warning that doing so may pose a security
14612+ risk.
14613+
1449214614HOOKS_LIBRARY_CLOSED
1449314615====================
1449414616
@@ -15975,6 +16097,18 @@ HOST_CACHE_INIT_OK
1597516097This info message indicates that the Host Cache hooks library has been
1597616098loaded successfully. Enjoy!
1597716099
16100+ HOST_CACHE_PATH_SECURITY_WARNING
16101+ ================================
16102+
16103+ .. code-block:: text
16104+
16105+ Cache file path specified is NOT SECURE: %1
16106+
16107+ This warning message is issued when security enforcement is
16108+ disabled and the host cache file path specified does not comply
16109+ with the supported path. The server will still use the specified
16110+ path but is warning that doing so may pose a security risk.
16111+
1597816112HOST_CMDS_DEINIT_OK
1597916113===================
1598016114
@@ -16344,6 +16478,18 @@ Logged at debug log level 40.
1634416478This debug message is issued when a multi-threaded HTTP client instance has
1634516479been created. The argument specifies the maximum number of threads.
1634616480
16481+ HTTP_CLIENT_PASSWORD_SECURITY_WARNING
16482+ =====================================
16483+
16484+ .. code-block:: text
16485+
16486+ use of clear text 'password' is NOT SECURE: %1
16487+
16488+ This warning message is issued when security enforcement is disabled
16489+ and command socket configuration uses clear text 'password' rather
16490+ than 'password-file'. The server will still use the socket as configured
16491+ but is warning that doing so may pose a security risk.
16492+
1634716493HTTP_CLIENT_QUEUE_SIZE_GROWING
1634816494==============================
1634916495
@@ -16465,6 +16611,18 @@ This debug message is issued when the HTTP request timeout has occurred and
1646516611the server is going to send a response with Http Request timeout status
1646616612code.
1646716613
16614+ HTTP_CLIENT_USER_SECURITY_WARNING
16615+ =================================
16616+
16617+ .. code-block:: text
16618+
16619+ use of clear text 'user' is NOT SECURE: %1
16620+
16621+ This warning message is issued when security enforcement is disabled
16622+ and command socket configuration uses clear text 'user' rather
16623+ than 'user-file'. The server will still use the socket as configured
16624+ but is warning that doing so may pose a security risk.
16625+
1646816626HTTP_COMMAND_MGR_HTTPS_SERVICE_REUSE_FAILED
1646916627===========================================
1647016628
@@ -17039,6 +17197,19 @@ This error message indicates an error loading the Lease Commands
1703917197hooks library. The details of the error are provided as argument of
1704017198the log message.
1704117199
17200+ LEASE_CMDS_PATH_SECURITY_WARNING
17201+ ================================
17202+
17203+ .. code-block:: text
17204+
17205+ lease file path specified is NOT SECURE: %1
17206+
17207+ This warning message is issued when security enforcement is disabled
17208+ and the path portion of the `filename` parameter of the lease4-write
17209+ or lease6-write command does not comply with the supported path. The
17210+ server will still use the specified path but is warning that doing so
17211+ may pose a security risk.
17212+
1704217213LEASE_CMDS_RESEND_DDNS4
1704317214=======================
1704417215
@@ -17442,6 +17613,19 @@ Logged at debug log level 50.
1744217613A debug message issued when a new MySQL connected is created with TLS.
1744317614The TLS cipher name is logged.
1744417615
17616+ LEGAL_LOG_PATH_SECURITY_WARNING
17617+ ===============================
17618+
17619+ .. code-block:: text
17620+
17621+ Forensic log path specified is NOT SECURE: %1
17622+
17623+ This warning message is issued when security enforcement is
17624+ disabled and the path specified for forensic logging output
17625+ does not comply with the supported path. The server will
17626+ still use the specified path but is warning that doing so may
17627+ pose a security risk.
17628+
1744517629LEGAL_LOG_PGSQL_COMMIT
1744617630======================
1744717631
0 commit comments