Even on native Linux these days Security-Enhanced Linux (SELinux) is being used increasingly to limit the need for system or service processes to run as UID 0 by allowing a much more granular granting of access to filesystem and other resources.  One of the things that attracted me, a former RACF admin, to Fedora Linux was its early support for SELinux; although there are still Fedora users that choose to run with SELinux in "disabled" mode to avoid dealing with any issues SELinux can cause:  Unlike RACF, there are default categorization of resources and default access policies that are embedded with the system and system-level application installation with the intent of providing reasonable protections with no additional post-installation customization.  Unfortunately those defaults are sometimes in error for specific applications, and most users with a personal Linux system just for running common user applications would have no clue how to diagnose or resolve SELinux problems.   Sometimes the maintenance people for those applications have no clue either, because they personally run with SELinux disabled and whoever understood SELinux well enough to set up the SELinux defaults for the application is no longer available.

One would hope that by now RACF would at least have the ability to permit the same level of granularity of access as SELinux provides in native Linux.  With better control over long-term development goals, it should be easier to push for avoidance of UID 0 requirements in z/OS than in the Linux universe, where individuals on multiple volunteer maintenance teams must first be convinced to support running with SELinux in "enforcing" mode.

    Joel C. Ewing

On 4/11/23 14:22, Rick Troth wrote:
Find out what they're trying to do "as superuser".
Based on the hint you provide, that it's an FTP-like product, the requirement might be for authentication and/or authorization. In traditional Unix environments, that's a legitimate use of UID 0 (even though, yeah, too much authority to the application). But on z/OS there are safer ways to perform authentication (and/or authorization).

It's frustrating to hear about this. The demand for UID 0 and related privilege escalations has led to all sorts of countermeasures, most of which have created additional problems.

I run most services each under their own service account.
There are too many ways to selectively escalate for mention in this email. Find out what this vendor really needs. They're going to have to tell you. It's fair for you to tell them "no UID(0)".

-- R; <><


On 4/11/23 15:06, Colin Paice wrote:
I've been reviewing someone's (ftp like) product documentation, and they
say that the userid that runs their product needs id(0) to be able to run. This feels like giving too much authority to the userid.  Is there a better
way of defining the userid and its access to resources to be able to
eliminate the need for  id(0)?
Colin
...

--
Joel C. Ewing

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to