Darren Reed wrote:
> Will Young wrote:
>   
>>    Based on the description of the desired granularity I think the 
>> typical model of using PRIV_SYS_NET_CONFIG (and/or PRIV_SYS_IP_CONFIG) 
>> then modifying commands such as ipf to check more specific 
>> authorizations works.
>>     
>
> I must confess that I'm feeling quite alarmed at how many different
> actions are falling under PRIV_SYS_NET_CONFIG. It's like
> anyone with that privilege is the "network superuser", which kind
> of scares me. Which is why I'm asking "where are privileges going?"
> Does that one privilege really need to be reused amongst so many
> different programs/features?
>   

    While there is a general sentiment of the finer grain the better, I 
think our first priority is the limiting running with any elevated 
privileges.  If this is done correctly there is no literal "network 
superuser" in that users are given the privilege only when it is 
constrained by specific commands which can enforce more complex rules 
than the kernel privilege model.

    Finer grain privileges would mean there is less to attack if one 
escapes the constraints of specific commands, but this is of less 
benefit then it sounds like unless the privileges are carefully 
considered.  I.e. a division by technologies gives a firewall privilege, 
a tunnel privilege, an IPsec policy privilege, and an interface change 
privilege that can each individually do different forms of traffic 
redirection attacks.  Yet a site may be inclined to assign one of these 
privileges directly to a user as they sound much safer.
    -Will
> Darren
>
> _______________________________________________
> security-discuss mailing list
> security-discuss at opensolaris.org
>   


Reply via email to