On Thu, Feb 1, 2018 at 11:25 AM, Sumit Bose <sb...@redhat.com> wrote:

> On Wed, Jan 31, 2018 at 10:01:15AM -0500, Simo Sorce wrote:
> > On Wed, 2018-01-31 at 14:55 +0100, Fabiano Fidêncio wrote:
> > > Sumit,
> > >
> > > On Fri, Jan 26, 2018 at 9:01 PM, Sumit Bose <sb...@redhat.com> wrote:
> >
> > [..]
> >
> > > I'll leave the other 2 questions to Simo. :-)
> > >
> > > I wonder if there is a chance that e.g. a signal can force to backend
> to do
> > > > something else when running with the changed euid?
> >
> > If I am not wrong we pipe all signals back quickly into tevent events,
> > so signals should not cause issues. This should be carefully checked
> > but I would be surprised if any of our signal handlers do any I/O
> > besides triggering a tevent via pipe, it is not recommended to do that
> > anyway.
> > On whether seteuid influences the delivery of signals I am not 100%
> > sure, but I think only a real uid change will affect that, not the
> > effective uid. (on the receiving side which is what we care about).
> >
> > So I think we are OK here.
> >
> > That said, are we sure we retain CAP_SETUID ?
> >
> > > > Is there something you do not like about the approach of PR498?
> >
> > Here my comments from the tracker:
> >
> > FWIW,
> > I see nothing wrong in keeping CAP_DAC_OVERRIDE, the process is running
> > as root and can impersonate users at any time so removing this
> > capability does not change the security stance.
> >
> > However it may make some errors less severe if people use seteuid() to
> > change the effective id of the user, because then the process cannot
> > alter data or access compartmentalized data by mistake.
> >
> > Opening permissions on the files negates the benefit of using seteuid()
> > so it is the least desirable way to handle this "issue".
>
> Thank you for the explanations, so I'm fine with using seteuid()/setegid().
>


I've updated the design page and send the patches to FleetCommander
developers so they can test it.
I'll update the github PR as soon as I have their feedback.

So, summing up, thanks for the inputs!


>
> Fabiano, nevertheless I'd like to ask some questions about the profile
> files, please let me know if I should better ask the Fleetcommander
> developers.
>

> Is it expected that the user can change the data in the file? Or is it
> the other way round that it would be better that the user only has
> read-only access so that the admin can force some settings?
>

I'd say not. So, maybe going for a read-only solution would be better.
Here, I'll confirm this with Oliver.


> Is it possible that there is any sensitive information in the profile
> files or would it be ok if anyone can read it? (hm, while writing the
> question I started wondering if I would be happy if everyone knows that
> my desktop background is pink_unicorns.jpg?).
>

This is a quite good question and I'll redirect it to Oliver and get back
to you as soon as I have both answers.


>
> bye,
> Sumit
> >
> > HTH,
> > Simo.
> >
> > --
> > Simo Sorce
> > Sr. Principal Software Engineer
> > Red Hat, Inc
> > _______________________________________________
> > sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org
> > To unsubscribe send an email to sssd-devel-le...@lists.fedorahosted.org
> _______________________________________________
> sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org
> To unsubscribe send an email to sssd-devel-le...@lists.fedorahosted.org
>
_______________________________________________
sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org
To unsubscribe send an email to sssd-devel-le...@lists.fedorahosted.org

Reply via email to