On Wed, 2015-04-01 at 13:37 -0400, Miloslav Trmač wrote: > Hello, > > We should chat with Miloslav Trmač (mitr) about this. I've added him to > > CC, hi Miloslav! The goal here is to use polkit to express the rule > > "local admins can perform the action without entering any password, but > > non-admin users must enter an admin password." > > Hum. Doesn’t http://fedoraproject.org/wiki/Privilege_escalation_policy > require authentication at least with the users’ password?
Hm, I don't agree that gnome-control-center is violating that policy. gnome-control-center allows only privileged (admin) users to change certain settings without password authentication. That policy applies to unprivileged users. In particular, this sentence seems to specifically allow gnome-control-center's behavior: "In the case of an approved Fedora spin which automatically grants administrative privileges to the first created user account, authentication as that user can be considered administrative authentication; the same applies to any user account subsequently granted those privileges by the system administrator." You could make a case that applies only to spins rather than official products, I suppose. > > The polkit manual is pretty clear that applications should never do > > this: > > > > "Authorization rules are intended for two specific audiences > > That thing is fairly impractical, > https://bugzilla.redhat.com/show_bug.cgi?id=956005 . IMO, _that_ is not as > much a blocker as the escalation policy above. OK, thanks. Well then let's try to resolve https://bugs.freedesktop.org/show_bug.cgi?id=80921 where I've added a comment to answer David Z's request. The other thing that would be nice would be a way to get the real admin group, rather than just guessing that it's wheel. Note that openSUSE also violates this "policy" on an epic level, since they ship a .rules file that overrides every authorization rule. I think that breaks pkla-check-authorization. > I am very uneasy about blanked auth_if_nonadmin in any environment that is > not physically secured (~ 2 different! people watching the computer to make > sure nobody unauthorized is operating it), including the typical open-plan > office. Not all physical access is the same; it is much easier to lean to a > computer and type a single administrative command than to otherwise exploit > an unlocked computer in the office (rebooting from an USB disk will be > defeated by disk encryption, downloading and installing a keylogger running > within the session requires a much larger amount of premediation). > > The above-mentioned ”authenticate within the last $five minutes” (or perhaps, > more precisely, “no period of inactivity longer than $two minutes since last > authentication”) solution would, I think, work reasonably well, and can be > implemented as a polkit authentication agent without otherwise changing the > rules. But at the moment the privilege escalation policy stands as it is, > and AFAICS requires authentication. Some places have different security requirements than others. :) I'm pretty sure the defaults in Workstation should optimize for home users that have no fear of a physical attacker, except the real risk a thief might steal the computer. Even for corporate deployments, I'm not convinced the password prompt provides meaningful security: here you have a very real risk of corporate spies gaining physical access to your computer, but they're trying to get your company's secrets from your home directory or network storage (disaster!), not change your timezone or look at core dumps. So I think it's safe to waive these password prompts in many (or perhaps all) cases where auth_admin_keep would be used. Michael