Re: Initial draft of privilege escalation policy

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2010-01-20 at 09:09 -0500, Matthias Clasen wrote:

> > The policy requires that any code which allows a user to perform, or
> > cause to be performed, certain actions must require authentication
> as
> > the root user prior to the action being carried out. The actions
> are:
> 
> This does not seem right. While we want a standard, unprivileged user
> to
> not be able to do these things, we very much want to define an
> 'Administrator' role that can be assigned to users other than root and
> that will enable them to do many of these things by just
> authenticating
> as themselves, not as root. 

> The policy should be worded in a way that makes it clear that this is
> allowed.

(apologies for the erratic line wrapping, seems to be a bug in Rawhide
evolution).

Right, spot had a little note to that effect in the blog post, I forgot
to reproduce it in the policy. Will update.

> > * Add, remove, upgrade or downgrade any system-wide application or
> > shared resource (packaged or otherwise)
> 
> I don't see how a Fedora policy can apply to non-packaged resources;
> other than the fact that those resources will be subject to normal
> access control (e.g. file permissions).

The envisaged situation is a *packaged* application which is built in
such a way that it would allow an unprivileged user to cause a binary to
be stuck in /usr/bin , or a library in /usr/lib , or whatever - whether
that is by the installation of another Fedora package, or just by the
application going out and downloading it and dumping it there itself.

> > * Read or write directly to or from system memory (with the
> exception
> > that the 'cause to be performed' provision is waived in this case)
> 
> This seems entirely too vague to make sense. What does 'system memory'
> mean here ?

Actually I sort of agree. :) Spot, are you reading? Can you clarify?
This came straight from spot's post.

> > * Start or stop system daemons
> 
> With the exception of daemons that are autostarted D-Bus system bus
> services...

Will add.

> > * Edit system-wide configuration files
> 
> Seems clear enough on the face of it, but is /etc/passwd a system-wide
> configuration file ? Users do edit that by changing e.g. their
> password.

Well, see the definition of 'system-wide' further down. This particular
use would be excepted because it doesn't affect any other user.

> > * Write to system logs (with the exception that the 'cause to be
> > performed' provision is waived in this case)
> 
> Huh ? The mere fact of me logging in will cause system logs to be
> written...

Hence the bit in brackets. It says that the language about 'cause to be
performed' is waived for this case; i.e., this rule only means that
users should not be able to write *directly* to system logs. Performing
actions which cause system processes to write to system logs is of
course fine.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Fedora Talk: adamwill AT fedoraproject DOT org
http://www.happyassassin.net

-- 
test mailing list
test@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe: 
https://admin.fedoraproject.org/mailman/listinfo/test

[Index of Archives]     [Fedora Desktop]     [Fedora SELinux]     [Photo Sharing]     [Yosemite Forum]     [KDE Users]

  Powered by Linux