Stephen John Smoogen wrote: > One of the reasons for it to be in /etc/shells was that various audit > systems failed an OS if it wasn't. [Various government and bank > security audit tools have rules like > https://www.stigviewer.com/stig/vmware_esxi_v5/2013-01-15/finding/GEN002140-ESXI5-000046 > ] The second reason was that outside scripts would fail because chsh > was giving an 'error' that nologin was not there. So the audit tools REQUIRE you to add a critical security hole? > While it can be argued that these are problems with other parties what > was happening is that they haven't been fixed in multiple years and > everyone who had to have anything from a PCI to a .gov audit had to go > put this in the file already. This basically then becomes a "do you > need to manually add this on the system? [Y/N]" purchase checkmark for > banks, credit card processors, government contractors. Nobody should ever add this at all. And most definitely not Fedora. The behavior the original poster pointed out: | - su -s /bin/bash - nologinuser (if "nologinuser" has /sbin/nologin as the | default shell) succeeds with /bin/bash if auth is successful [2], even | though man 1 su, man 8 nologin, and man 5 shells suggest that such a user | is a restricted user and logging in with an alternate specified shell | should be forbidden. sounds very much like a critical privilege escalation security hole to me, that should get a CVE and be fixed in all supported Fedora releases ASAP! Kevin Kofler _______________________________________________ devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx