Hi!

On Sun, 2008-05-11 at 15:22:59 +0200, Raphael Hertzog wrote:
> On Sun, 11 May 2008, [email protected] wrote:
> > Please make all and create new /var/log/dpkg.log* in 644 mode.
> > I see no reason for not letting users see what is going on.
> > The can do dpkg -l anyway, and the only files not readable by the user
> > in e.g., /var/lib/dpkg/ are some 0 byte lock files too.
> 
> Why should this log file be treated differently? If the user is part of
> the adm group, he can see the logs, otherwise he can't.

Some time ago I needed to take a look and I also found it being a bit
annoying, also other related logs like apt or aptitude are world
readable. But you are right about the adm group, and fixing this implies
changing the group to root as well.

> On the other hand, I don't see any obvious security concern by giving read
> rights to this file except maybe for attacks that involve some precise
> timing wrt dpkg operations. I don't know if that's enough to warrant the
> restricted rights.

I don't see any such attack being possible, the user would need higher
privileges anyway, and you can already mointor what's going on in the
file syste, with stuff like inotify. In case that kind of attack would
be possible, the code is already vulnerable anyway, and it should be
fixed instead.

I've a local fix, which I'm thinking to push in few days if no one
has strong objections?

regards,
guillem



-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to