<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Porta/DataStore SSH private keys in Azure Security Scan in ArcGIS Enterprise Questions</title>
    <link>https://community.esri.com/t5/arcgis-enterprise-questions/porta-datastore-ssh-private-keys-in-azure-security/m-p/1385664#M38702</link>
    <description>&lt;P&gt;Hi Patrick,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding these:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;C:\Program Files\ArcGIS\DataStore\framework\runtime\couchdb\ssl\key.pem&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;C:\Program Files\ArcGIS\DataStore\framework\template\nosql\ssl\key.pem&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;C:\Program Files\ArcGIS\Portal\framework\runtime\ds\framework\template\nosql\ssl\key.pem&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;These aren't SSH keys. These are 1/2 of the keypair used to support TLS in these components. The certificate keypair (cert + key) is self signed. These are key that are automatically generated upon installation. They are not trusted because they are self signed and not validated up to a certificate authority.&amp;nbsp;&lt;/P&gt;&lt;P&gt;For these:&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;C:\Program Files\ArcGIS\DataStore\framework\runtime\ozone\compose\ozone-om-ha\.ssh\id_rsa&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;C:\Program Files\ArcGIS\DataStore\framework\runtime\ozone\compose\ozonescripts\.ssh\id_rsa&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;Those keys are used to start Ozone. It's used in the Object Store. If you don't have the object store configured, you can remove it via add/remove programs, but I'd disagree that these are a risk because they are only used in local communication. If an attacker has access to these keys, then they already have local admin on your ArcGIS Enterprise installation (a much bigger problem).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://ozone.apache.org/docs/1.2.1/start/onprem.html" target="_blank"&gt;https://ozone.apache.org/docs/1.2.1/start/onprem.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 22 Feb 2024 19:52:21 GMT</pubDate>
    <dc:creator>RandallWilliams</dc:creator>
    <dc:date>2024-02-22T19:52:21Z</dc:date>
    <item>
      <title>Porta/DataStore SSH private keys in Azure Security Scan</title>
      <link>https://community.esri.com/t5/arcgis-enterprise-questions/porta-datastore-ssh-private-keys-in-azure-security/m-p/1381182#M38585</link>
      <description>&lt;P&gt;Our organization has deployed ArcGIS Enterprise in Microsoft Azure.&amp;nbsp; One of our Microsoft Defender security findings flagged "Unverified insecure SSH private key" related to ArcGIS Portal and DataStore.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was tasked with learning if these files can be removed; or if they can be password protected.&amp;nbsp; The files in question are so deep in the directory structure.&lt;/P&gt;&lt;P&gt;Has anybody else encountered this issue?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;C:\Program Files\ArcGIS\DataStore\framework\runtime\couchdb\ssl\key.pem&lt;BR /&gt;C:\Program Files\ArcGIS\DataStore\framework\runtime\ozone\compose\ozone-om-ha\.ssh\id_rsa&lt;BR /&gt;C:\Program Files\ArcGIS\DataStore\framework\runtime\ozone\compose\ozonescripts\.ssh\id_rsa&lt;BR /&gt;C:\Program Files\ArcGIS\DataStore\framework\template\nosql\ssl\key.pem&lt;BR /&gt;C:\Program Files\ArcGIS\Portal\framework\runtime\ds\framework\template\nosql\ssl\key.pem&lt;/P&gt;</description>
      <pubDate>Mon, 12 Feb 2024 17:58:06 GMT</pubDate>
      <guid>https://community.esri.com/t5/arcgis-enterprise-questions/porta-datastore-ssh-private-keys-in-azure-security/m-p/1381182#M38585</guid>
      <dc:creator>PatrickMcKinney99</dc:creator>
      <dc:date>2024-02-12T17:58:06Z</dc:date>
    </item>
    <item>
      <title>Re: Porta/DataStore SSH private keys in Azure Security Scan</title>
      <link>https://community.esri.com/t5/arcgis-enterprise-questions/porta-datastore-ssh-private-keys-in-azure-security/m-p/1381292#M38589</link>
      <description>&lt;P&gt;Follow &lt;A href="https://trust.arcgis.com/en/security-concern/" target="_blank" rel="noopener"&gt;this link&lt;/A&gt; to the ArcGIS Trust site, and fill out the form to submit a security concern to Esri. The team will review and follow up with suggestions, that won't involve removing the files or altering them in a way that could cause ArcGIS Enterprise to stop working.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Feb 2024 20:46:27 GMT</pubDate>
      <guid>https://community.esri.com/t5/arcgis-enterprise-questions/porta-datastore-ssh-private-keys-in-azure-security/m-p/1381292#M38589</guid>
      <dc:creator>ReeseFacendini</dc:creator>
      <dc:date>2024-02-12T20:46:27Z</dc:date>
    </item>
    <item>
      <title>Re: Porta/DataStore SSH private keys in Azure Security Scan</title>
      <link>https://community.esri.com/t5/arcgis-enterprise-questions/porta-datastore-ssh-private-keys-in-azure-security/m-p/1385664#M38702</link>
      <description>&lt;P&gt;Hi Patrick,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding these:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;C:\Program Files\ArcGIS\DataStore\framework\runtime\couchdb\ssl\key.pem&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;C:\Program Files\ArcGIS\DataStore\framework\template\nosql\ssl\key.pem&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;C:\Program Files\ArcGIS\Portal\framework\runtime\ds\framework\template\nosql\ssl\key.pem&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;These aren't SSH keys. These are 1/2 of the keypair used to support TLS in these components. The certificate keypair (cert + key) is self signed. These are key that are automatically generated upon installation. They are not trusted because they are self signed and not validated up to a certificate authority.&amp;nbsp;&lt;/P&gt;&lt;P&gt;For these:&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;C:\Program Files\ArcGIS\DataStore\framework\runtime\ozone\compose\ozone-om-ha\.ssh\id_rsa&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;C:\Program Files\ArcGIS\DataStore\framework\runtime\ozone\compose\ozonescripts\.ssh\id_rsa&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;Those keys are used to start Ozone. It's used in the Object Store. If you don't have the object store configured, you can remove it via add/remove programs, but I'd disagree that these are a risk because they are only used in local communication. If an attacker has access to these keys, then they already have local admin on your ArcGIS Enterprise installation (a much bigger problem).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://ozone.apache.org/docs/1.2.1/start/onprem.html" target="_blank"&gt;https://ozone.apache.org/docs/1.2.1/start/onprem.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 19:52:21 GMT</pubDate>
      <guid>https://community.esri.com/t5/arcgis-enterprise-questions/porta-datastore-ssh-private-keys-in-azure-security/m-p/1385664#M38702</guid>
      <dc:creator>RandallWilliams</dc:creator>
      <dc:date>2024-02-22T19:52:21Z</dc:date>
    </item>
  </channel>
</rss>

