commit:     94bfb597738bad84a823b5f086cb7ffa72675ef7
Author:     Karel Kočí <cynerd <AT> email <DOT> cz>
AuthorDate: Tue Dec  4 19:27:04 2018 +0000
Commit:     Lars Wendler <polynomial-c <AT> gentoo <DOT> org>
CommitDate: Sun Jan 13 01:10:30 2019 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=94bfb597

app-admin/sudo: Add secure-path use

It makes sense to mask PATH variable when sudo is executed for secure
reasons with known secure content. Problem is that this is not common on
other distributions and in some cases it makes sense to allow user's
PATH to be used because it complicates common use of sudo such as:
sudo !!
This does not change default previous behavior. It just adds an use flag
to enabling secure-path that is in default enabled.

Bug: https://bugs.gentoo.org/672522

Signed-off-by: Karel Kočí <cynerd <AT> email.cz>
Closes: https://github.com/gentoo/gentoo/pull/10566
Signed-off-by: Lars Wendler <polynomial-c <AT> gentoo.org>

 app-admin/sudo/metadata.xml          |   1 +
 app-admin/sudo/sudo-1.8.26-r1.ebuild | 243 +++++++++++++++++++++++++++++++++++
 2 files changed, 244 insertions(+)

diff --git a/app-admin/sudo/metadata.xml b/app-admin/sudo/metadata.xml
index 66a78473b2e..de20459ab49 100644
--- a/app-admin/sudo/metadata.xml
+++ b/app-admin/sudo/metadata.xml
@@ -17,6 +17,7 @@
                <flag name="openssl">Use SHA2 from <pkg>dev-libs/openssl</pkg> 
instead of sudo's internal SHA2</flag>
                <flag name="sendmail">Allow sudo to send emails with 
sendmail</flag>
                <flag name="sssd">Add System Security Services Daemon 
support</flag>
+               <flag name="secure-path">Replace PATH variable with compile 
time secure paths</flag>
        </use>
        <upstream>
                <remote-id type="cpe">cpe:/a:todd_miller:sudo</remote-id>

diff --git a/app-admin/sudo/sudo-1.8.26-r1.ebuild 
b/app-admin/sudo/sudo-1.8.26-r1.ebuild
new file mode 100644
index 00000000000..fd5b1a9c50b
--- /dev/null
+++ b/app-admin/sudo/sudo-1.8.26-r1.ebuild
@@ -0,0 +1,243 @@
+# Copyright 1999-2018 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=6
+
+inherit eutils pam multilib libtool tmpfiles
+if [[ ${PV} == "9999" ]] ; then
+       EHG_REPO_URI="https://www.sudo.ws/repos/sudo";
+       inherit mercurial
+fi
+
+MY_P=${P/_/}
+MY_P=${MY_P/beta/b}
+
+uri_prefix=
+case ${P} in
+       *_beta*|*_rc*) uri_prefix=beta/ ;;
+esac
+
+DESCRIPTION="Allows users or groups to run commands as other users"
+HOMEPAGE="https://www.sudo.ws/";
+if [[ ${PV} != "9999" ]] ; then
+       SRC_URI="https://www.sudo.ws/sudo/dist/${uri_prefix}${MY_P}.tar.gz
+               ftp://ftp.sudo.ws/pub/sudo/${uri_prefix}${MY_P}.tar.gz";
+       if [[ ${PV} != *_beta* ]] && [[ ${PV} != *_rc* ]] ; then
+               KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips 
~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~x86-fbsd ~sparc-solaris"
+       fi
+fi
+
+# Basic license is ISC-style as-is, some files are released under
+# 3-clause BSD license
+LICENSE="ISC BSD"
+SLOT="0"
+IUSE="gcrypt ldap nls offensive openssl pam sasl +secure-path selinux 
+sendmail skey sssd"
+
+CDEPEND="
+       sys-libs/zlib:=
+       gcrypt? ( dev-libs/libgcrypt:= )
+       ldap? (
+               >=net-nds/openldap-2.1.30-r1
+               dev-libs/cyrus-sasl
+       )
+       openssl? ( dev-libs/openssl:0= )
+       pam? ( virtual/pam )
+       sasl? ( dev-libs/cyrus-sasl )
+       skey? ( >=sys-auth/skey-1.1.5-r1 )
+       sssd? ( sys-auth/sssd[sudo] )
+"
+RDEPEND="
+       ${CDEPEND}
+       >=app-misc/editor-wrapper-3
+       virtual/editor
+       ldap? ( dev-lang/perl )
+       pam? ( sys-auth/pambase )
+       selinux? ( sec-policy/selinux-sudo )
+       sendmail? ( virtual/mta )
+"
+DEPEND="
+       ${CDEPEND}
+       sys-devel/bison
+"
+
+S="${WORKDIR}/${MY_P}"
+
+REQUIRED_USE="
+       pam? ( !skey )
+       skey? ( !pam )
+       ?? ( gcrypt openssl )
+"
+
+MAKEOPTS+=" SAMPLES="
+
+src_prepare() {
+       default
+       elibtoolize
+}
+
+set_secure_path() {
+       # FIXME: secure_path is a compile time setting. using PATH or
+       # ROOTPATH is not perfect, env-update may invalidate this, but until it
+       # is available as a sudoers setting this will have to do.
+       einfo "Setting secure_path ..."
+
+       # first extract the default ROOTPATH from build env
+       SECURE_PATH=$(unset ROOTPATH; . "${EPREFIX}"/etc/profile.env;
+               echo "${ROOTPATH}")
+               case "${SECURE_PATH}" in
+                       */usr/sbin*) ;;
+                       *) SECURE_PATH=$(unset PATH;
+                               . "${EPREFIX}"/etc/profile.env; echo "${PATH}")
+                               ;;
+               esac
+       if [[ -z ${SECURE_PATH} ]] ; then
+               ewarn " Failed to detect SECURE_PATH, please report this"
+       fi
+
+       # then remove duplicate path entries
+       cleanpath() {
+               local newpath thisp IFS=:
+               for thisp in $1 ; do
+                       if [[ :${newpath}: != *:${thisp}:* ]] ; then
+                               newpath+=:$thisp
+                       else
+                               einfo "   Duplicate entry ${thisp} removed..."
+                       fi
+               done
+               SECURE_PATH=${newpath#:}
+       }
+       cleanpath 
/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:/opt/bin${SECURE_PATH:+:${SECURE_PATH}}
+
+       # finally, strip gcc paths #136027
+       rmpath() {
+               local e newpath thisp IFS=:
+               for thisp in ${SECURE_PATH} ; do
+                       for e ; do [[ $thisp == $e ]] && continue 2 ; done
+                       newpath+=:$thisp
+               done
+               SECURE_PATH=${newpath#:}
+       }
+       rmpath '*/gcc-bin/*' '*/gnat-gcc-bin/*' '*/gnat-gcc/*'
+
+       einfo "... done"
+}
+
+src_configure() {
+       local SECURE_PATH
+       set_secure_path
+
+       # audit: somebody got to explain me how I can test this before I
+       # enable it.. - Diego
+       # plugindir: autoconf code is crappy and does not delay evaluation
+       # until `make` time, so we have to use a full path here rather than
+       # basing off other values.
+       myeconfargs=(
+               --enable-zlib=system
+               --enable-tmpfiles.d="${EPREFIX}"/usr/lib/tmpfiles.d
+               --with-editor="${EPREFIX}"/usr/libexec/editor
+               --with-env-editor
+               --with-plugindir="${EPREFIX}"/usr/$(get_libdir)/sudo
+               --with-rundir="${EPREFIX}"/run/sudo
+               $(use_with secure-path secure-path ${SECURE_PATH})
+               --with-secure-path="${SECURE_PATH}"
+               --with-vardir="${EPREFIX}"/var/db/sudo
+               --without-linux-audit
+               --without-opie
+               $(use_enable gcrypt)
+               $(use_enable nls)
+               $(use_enable openssl)
+               $(use_enable sasl)
+               $(use_with offensive insults)
+               $(use_with offensive all-insults)
+               $(use_with ldap ldap_conf_file /etc/ldap.conf.sudo)
+               $(use_with ldap)
+               $(use_with pam)
+               $(use_with skey)
+               $(use_with sssd)
+               $(use_with selinux)
+               $(use_with sendmail)
+       )
+       econf "${myeconfargs[@]}"
+}
+
+src_install() {
+       default
+
+       if use ldap ; then
+               dodoc README.LDAP
+
+               cat <<-EOF > "${T}"/ldap.conf.sudo
+               # See ldap.conf(5) and README.LDAP for details
+               # This file should only be readable by root
+
+               # supported directives: host, port, ssl, ldap_version
+               # uri, binddn, bindpw, sudoers_base, sudoers_debug
+               # tls_{checkpeer,cacertfile,cacertdir,randfile,ciphers,cert,key}
+               EOF
+
+               insinto /etc
+               doins "${T}"/ldap.conf.sudo
+               fperms 0440 /etc/ldap.conf.sudo
+
+               insinto /etc/openldap/schema
+               newins doc/schema.OpenLDAP sudo.schema
+       fi
+
+       pamd_mimic system-auth sudo auth account session
+
+       keepdir /var/db/sudo/lectured
+       fperms 0700 /var/db/sudo/lectured
+       fperms 0711 /var/db/sudo #652958
+
+       # Don't install into /run as that is a tmpfs most of the time
+       # (bug #504854)
+       rm -rf "${ED%/}"/run
+}
+
+pkg_postinst() {
+       tmpfiles_process sudo.conf
+
+       #652958
+       local sudo_db="${EROOT}/var/db/sudo"
+       if [[ "$(stat -c %a "${sudo_db}")" -ne 711 ]] ; then
+               chmod 711 "${sudo_db}" || die
+       fi
+
+       if use ldap ; then
+               ewarn
+               ewarn "sudo uses the /etc/ldap.conf.sudo file for ldap 
configuration."
+               ewarn
+               if grep -qs '^[[:space:]]*sudoers:' "${ROOT}"/etc/nsswitch.conf 
; then
+                       ewarn "In 1.7 series, LDAP is no more consulted, unless 
explicitly"
+                       ewarn "configured in /etc/nsswitch.conf."
+                       ewarn
+                       ewarn "To make use of LDAP, add this line to your 
/etc/nsswitch.conf:"
+                       ewarn "  sudoers: ldap files"
+                       ewarn
+               fi
+       fi
+       if use prefix ; then
+               ewarn
+               ewarn "To use sudo, you need to change file ownership and 
permissions"
+               ewarn "with root privileges, as follows:"
+               ewarn
+               ewarn "  # chown root:root ${EPREFIX}/usr/bin/sudo"
+               ewarn "  # chown root:root ${EPREFIX}/usr/lib/sudo/sudoers.so"
+               ewarn "  # chown root:root ${EPREFIX}/etc/sudoers"
+               ewarn "  # chown root:root ${EPREFIX}/etc/sudoers.d"
+               ewarn "  # chown root:root ${EPREFIX}/var/db/sudo"
+               ewarn "  # chmod 4111 ${EPREFIX}/usr/bin/sudo"
+               ewarn
+       fi
+
+       elog "To use the -A (askpass) option, you need to install a compatible"
+       elog "password program from the following list. Starred packages will"
+       elog "automatically register for the use with sudo (but will not force"
+       elog "the -A option):"
+       elog ""
+       elog " [*] net-misc/ssh-askpass-fullscreen"
+       elog "     net-misc/x11-ssh-askpass"
+       elog ""
+       elog "You can override the choice by setting the SUDO_ASKPASS 
environmnent"
+       elog "variable to the program you want to use."
+}

Reply via email to