On Mar 2, 2015, at 3:43 PM, Tim Dunphy <bluethu...@gmail.com> wrote:
> 
>> 
>> errr, I meant,   sftp, not rscp
> 
> But the client isn't gonna go for that. LOL.

Why not?

SFTP clients are now as readily available as FTP clients.

Unless you’re going to tell me it needs to be done from a box you absolutely 
positively cannot install any new software on, I simply don’t believe that you 
cannot use anything but FTP.

> Or does that just defeat the purpose of
> having a secure SELlinux server entirely?

Not exactly, but it fights the same set of goals that SELinux was created to 
support.

The point of SELinux is to erect walls that prevent a lesser breach from 
turning into a total breach of the system’s security.  Allowing FTP doesn’t 
prevent SELinux from working.

If FTP exposes one of your user’s passwords to the wide world, *theoretically* 
that means you have done nothing worse than providing unauthorized users access 
to that user’s account.

(Not that that isn’t bad enough.)

Unfortunately, local root-escalation exploits pop up from time to time which 
allow anyone with a login on that box to turn themselves into superuser, which 
allows them to defeat SELinux.

Incidentally, it is possible to configure SSH to allow SFTP but not interactive 
logins.  You should also chroot SFTP users.  This thread seems to have the 
details you need:

  https://www.centos.org/forums/viewtopic.php?t=2080

By doing that, even a bad user who gives away their login credentials to a bad 
actor isn’t opening you to a risk of a local root escalation exploit.
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to