Re: Local users get to play root?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2009-11-18 at 23:18 +0530, Rahul Sundaram wrote:
> On 11/18/2009 11:19 PM, nodata wrote:
> 
> > 
> > Thanks. I have changed the title to:
> > "All users get to install software on a machine they do not have the
> > root password to"
> 
> .. if the packages are signed and from a signed repository. So, you left
> out the important part. Explain why this is a problem in a bit more
> detail.

 That is important, and personally I have a lot of sympathy for some of
the desired use cases¹ I've heard about.
 On the other hand this does open up a lot of ways to attack the system,
esp. given that there is _no_ authentication ... as I had expected that
code running as the user would still have to authenticate as the user
(Hello Linux virus makers, welcome to the party).
 Off the top of my head, these are the first things I'd look at for
attacking a system with PK and this config:

1. Does "install" of obsoleting packages come under the same auth. (if
so I can now arbitrarily upgrade certain packages).

2. Does "install" of installonly come under the same auth. (if so I can
now stop kernel upgrades).

3. Are there any attacks due to disk space used? Eg. If /var is low² I
can probably install enough pkgs to make logging stop.

4. Are there any attacks against packages with "default on" services?
(Note that you can almost certainly wait until there is an attack, and
then install the insecure service).

5. Are there any attacks against packages with set*id apps? (Dito. with
the waiting approach in #4).

6. Are there any attacks against packages which provide plugins? (Dito.
waiting)

7. And the most obvious one ... how hard is it to get a bad package into
one of the repos. that the machine has enabled.


¹ Things like letting a spouse/child install a new
game/theme/editor/etc. without having to get "their admin" to do it.

² If /var is on a separate partition then spamming /var/tmp is a goood
first step here.

-- 
James Antill - james@xxxxxxxxxxxxxxxxx
http://yum.baseurl.org/wiki/releases
http://yum.baseurl.org/wiki/whatsnew/3.2.25
http://yum.baseurl.org/wiki/YumMultipleMachineCaching

-- 
fedora-devel-list mailing list
fedora-devel-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-devel-list

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux