Re: /sbin/nologin in /etc/shells

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 29 September 2016 at 20:55, Kevin Kofler <kevin.kofler@xxxxxxxxx> wrote:
> Stephen John Smoogen wrote:
>> One of the reasons for it to be in /etc/shells was that various audit
>> systems failed an OS if it wasn't. [Various government and bank
>> security audit tools have rules like
>> https://www.stigviewer.com/stig/vmware_esxi_v5/2013-01-15/finding/GEN002140-ESXI5-000046
>> ] The second reason was that outside scripts would fail because chsh
>> was giving an 'error' that nologin was not there.
>
> So the audit tools REQUIRE you to add a critical security hole?
>

Yep. Been that way for multiple audit curriculum since the 1980's
(Orange Book?) ? I have seen it in everything from banks, to NATO, to
.gov, to scientific systems which were going to EU labs. I expect some
amount of it is cargo cult but it is what it is currently. I have
enough Sisyphus tasks on my plate already to add this to it.


>> While it can be argued that these are problems with other parties what
>> was happening is that they haven't been fixed in multiple years and
>> everyone who had to have anything from a PCI to a .gov audit had to go
>> put this in the file already. This basically then becomes a "do you
>> need to manually add this on the system? [Y/N]" purchase checkmark for
>> banks, credit card processors, government contractors.
>
> Nobody should ever add this at all. And most definitely not Fedora.

Well that boat sailed in 2001... so have you been removing it from
your /etc/shells in the last 15 years?

>
> The behavior the original poster pointed out:
> | - su -s /bin/bash - nologinuser (if "nologinuser" has /sbin/nologin as the
> | default shell) succeeds with /bin/bash if auth is successful [2], even
> | though man 1 su, man 8 nologin, and man 5 shells suggest that such a user
> | is a restricted user and logging in with an alternate specified shell
> | should be forbidden.
> sounds very much like a critical privilege escalation security hole to me,
> that should get a CVE and be fixed in all supported Fedora releases ASAP!

I am not sure you would get a CVE on it as much as a "It is working as
it has been working for 30 years... fix the man page"

I don't think it is privilege escalation because the person needs to
know the account with /sbin/nologins password and they need to have
shell access to the system somehow. They aren't getting root, but only
to something that a password was set AND they have been allowed access
to a shell on the system even as a different user you have other
problems already.





-- 
Stephen J Smoogen.
_______________________________________________
devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux