Re: netcfg wlan connection renewal

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Wed, Sep 28, 2011 at 06:14:24PM -0500, C Anthony Risinger wrote:

> On Sep 28, 2011 3:53 PM, "Tom Gundersen" <teg@xxxxxxx> wrote:

> > The way it works is that both the frontend (the unprivileged process,
> > e.g. the GUI for setting your timezone) and the backend (the
> > privileged process, e.g. the app that writes the timezone data to
> > /etc/localtime) interface with PK. The backend will ultimately be the
> > one deciding who should be allowed to do what under which conditions,
> > PK is just the interface that lets this be done in a uniform way.
> 
> The process is similar for libvirt -- when the policy is "unix perms only"
> having r/w access to the control socket is enough to authorize.  However,
> when polkit is in use (the default) the socket is world writable simply
> because anyone *could* be authorized to use it (you could still use fs perms
> if you wanted) ... but all requests must be approved by polkit anyway, and
> at no time are you really exposing anything -- all configs/etc are never
> directly malleable or even disclosed.

Thanks to both of you, but I still must be missing something.

For example, when I insert an USB stick on my machine and
try to mount it as a normal user I get a reply that only
root can do that. That's what I actually want (there are
some exceptions in /etc/fstab for my owns sticks, which
are identified by UUID).

Yet some Gnome/KDE desktop apps are able to mount even when
running for a normal user, when PK agrees (which in my eyes
is a subvertion of a policy set by the sysadmin). How do they
do this if neither 'mount' nor the syscalls used by it take
any notice of PK (thank $GOD for that) ?

The only way I can imagine ATM is that such environments have
a collection of small suid programs or daemons (all talking
to PK) that do the work, and that PK is there to allow these
to be separate from the main apps which require the service.

If things work that way I'd say these are mafia tactics :-)

1. Make sure you have a number of corrupt police officers,
   judges, etc. (the privileged proxies or daemons),
2. Use them to impose your own laws (PK) instead of those
   of civil society (the system).

In that case the real security thread is (1), not (2).

Ciao,

-- 
FA



[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Share Photos]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]
  Powered by Linux