URL: https://github.com/SSSD/sssd/pull/21
Title: #21: IFP: expose user and group unique IDs through DBus

jhrozek commented:
"""
On Wed, Sep 21, 2016 at 03:57:19AM -0700, Pavel Březina wrote:
> On 09/21/2016 12:29 PM, Jakub Hrozek wrote:
> > On Tue, Sep 20, 2016 at 05:24:45AM -0700, sumit-bose wrote:
> >> > With the SIDs we already have a library thay pretty much anyone can
> > call and retrieve the SID for ID. But not for GUIDs.. CC @sbose-rh for
> > another opinion..
> >>
> >> In general the GUIDs are even less informative than the SID, e.g. you
> > cannot derive the domain form it, it is just a random strings created
> > with some rules to try to avoid collisions. So I cannot see a leak here.
> > Additionally I think there is only special protection on the LDAP side
> > on the GUID attribute, e.g. ipaUniqueID can be read anonymously.
> >>
> >> Only if the GUID is misused, e.g. as initial password, there would be
> > an issue but imo not on our side.
> >
> > Thank you.
> >
> > Then I don't see a reason to not accept this PR. I tested it and it
> > seems to work:
> >
> > $ dbus-send --print-reply --system --dest=org.freedesktop.sssd.infopipe
> > /org/freedesktop/sssd/infopipe/Users
> > org.freedesktop.sssd.infopipe.Users.FindByName string:ad...@ipa.test
> > method return time=1474453460.862332 sender=:1.305 -> destination=:1.308
> > serial=9 reply_serial=2
> > object path "/org/freedesktop/sssd/infopipe/Users/ipa_2etest/935600000"
> >
> > $ dbus-send --print-reply --system --dest=org.freedesktop.sssd.infopipe
> > /org/freedesktop/sssd/infopipe/Users/ipa_2etest/935600000
> > org.freedesktop.DBus.Properties.Get
> > string:org.freedesktop.sssd.infopipe.Users.User string:uniqueID
> > method return time=1474453484.184180 sender=:1.305 -> destination=:1.309
> > serial=11 reply_serial=2
> > variant string "4e80c946-436e-11e6-8fbd-525400f71478"
> >
> > If anyone thinks having group_attributes should block this PR, I'm OK
> > with implementing it..
> >
> > So I'll just wait a bit to see if there is any opposition and if not,
> > I'll push the patch..
> 
> Feel free to push it.
> 
> We can create a ticket to trac more detailed access control in IFP. I 
> remember that we talked about usign polkit for this, since IFP is slowly 
> growing we should look into this.
> 

We have https://fedorahosted.org/sssd/ticket/2328 for polkit so I
increased its priority. I also filed
https://fedorahosted.org/sssd/ticket/3195 for group_attributes (which
may or may not be relevant after #2328, but I didn't want to forget..)


"""

See the full comment at 
https://github.com/SSSD/sssd/pull/21#issuecomment-248857307
_______________________________________________
sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org
To unsubscribe send an email to sssd-devel-le...@lists.fedorahosted.org

Reply via email to