Re: Tunneling as a non-root user

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On Wed, 19 Aug 2020, Travis Hayes wrote:

> I’m setting up a Linux machine (CentOS7) and am trying to allow
> tap/tun tunneling.
>
> Our organization’s security policy prohibits root logins. Using
> OpenSSH server 7.4 (as provided by the CentOS repositories) non-root
> users are able to open tunnels as long as the sshd_config has The
> setting UsePrivilegeSeparation=no.
>
> All is well, but I wonder what security risks I am taking by disabling
> the separation.
>
> Also, I would like to update to a more current version of the server
> for security as well as for the SSH_TUNNEL environment variable
> introduced in 7.7, but the UsePrivilegeSeparation option has been
> deprecated and a current version (8.3p) refuses to run with that
> option present in the config file. Removing the option, the ioctl() to
> create the tun/tap interface fails, just like with 7.4.
>
> Now that privilege separation is a requirement, is the only way
> forward to allow root logins and authorize the client users by copying
> their public key into root’s authorized_keys file?
>
> If this is the case, I would be giving up per-user auditing, requiring
> keys instead of password (or PAM-based) authentication, as well as the
> ability to use Match blocks to control which users/groups/hosts are
> allowed to create tunnels and which are allowed normal sessions.
>
> Is this on the roadmap for future consideration?

tun/tap forwarding has always been a bit of a fringe feature and
has never had reliable non-root support. The problem is essentially
that most of the operations required to configure a network interface
are privileged.

A few people have asked for non-root tun forwarding over the years,
but nobody has come forward with a design for how it could work in
practice.

I'd certainly be open to a design that used some sort of plug-in
helper program to do the configuration steps, and let OpenSSH punt
all the decision-making to that :)

-d
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev




[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux