[Bug 479546] New: Review Request: jailkit - Jailkit limits user accounts to specific files and/or commands

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.

Summary: Review Request: jailkit - Jailkit limits user accounts to specific files and/or commands

https://bugzilla.redhat.com/show_bug.cgi?id=479546

           Summary: Review Request: jailkit - Jailkit limits user accounts
                    to specific files and/or commands
           Product: Fedora
           Version: rawhide
          Platform: All
        OS/Version: Linux
            Status: NEW
          Severity: medium
          Priority: low
         Component: Package Review
        AssignedTo: nobody@xxxxxxxxxxxxxxxxx
        ReportedBy: dignan.patrick@xxxxxxxxx
         QAContact: extras-qa@xxxxxxxxxxxxxxxxx
                CC: notting@xxxxxxxxxx, fedora-package-review@xxxxxxxxxx
   Estimated Hours: 0.0
    Classification: Fedora


Spec URL: http://users.wpi.edu/~dignan/jailkit.spec
SRPM URL: http://users.wpi.edu/~dignan/jailkit-2.5-1.fc10.src.rpm
Description: 
Jailkit is a set of utilities to limit user accounts to specific files using 
chroot() and or specific commands. Setting up a chroot shell, a shell limited 
to some specific command, or a daemon inside a chroot jail is a lot easier and 
can be automated using these utilities.

Jailkit is used in network security appliances from several well known 
manufacturers, internet servers from several large enterprise organisations, 
servers from internet service providers, as well as many smaller companies and 
private users that need to secure cvs, sftp, shell or daemon processes.


Builds in Koji in F8, F9, F10, and F11.
rpmlint output:
[dignan@localhost rpmbuild]$ rpmlint RPMS/i386/jailkit-2.5-1.fc10.i386.rpm 
jailkit.i386: E: setuid-binary /usr/sbin/jk_chrootsh root 04755
jailkit.i386: E: non-standard-executable-perm /usr/sbin/jk_chrootsh 04755
jailkit.i386: E: setuid-binary /usr/bin/jk_uchroot root 04755
jailkit.i386: E: non-standard-executable-perm /usr/bin/jk_uchroot 04755
jailkit.i386: E: setuid-binary /usr/sbin/jk_procmailwrapper root 04755
jailkit.i386: E: non-standard-executable-perm /usr/sbin/jk_procmailwrapper
04755
1 packages and 0 specfiles checked; 6 errors, 0 warnings.
[dignan@localhost rpmbuild]$ rpmlint
RPMS/i386/jailkit-debuginfo-2.5-1.fc10.i386.rpm 
1 packages and 0 specfiles checked; 0 errors, 0 warnings.
[dignan@localhost rpmbuild]$ rpmlint SRPMS/jailkit-2.5-1.fc10.src.rpm 
1 packages and 0 specfiles checked; 0 errors, 0 warnings.

The program requires that those binaries have the setuid bit set.  Since the
program deals with chroot that makes sense to me.

I am looking for a sponsor.

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.

_______________________________________________
Fedora-package-review mailing list
Fedora-package-review@xxxxxxxxxx
http://www.redhat.com/mailman/listinfo/fedora-package-review

[Index of Archives]     [Fedora Legacy]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]