I disagree with Timo's assessment; the attempt to write to
/etc/krb5.conf is from an access(2) check to _see_ if the file is
writable. If the file _is_ writable, then the sshd server knows Kerberos
is mis-configured and will _fail_. Of course, most of the time, the
standard Unix DAC checks will forbid the write access, and sshd
continues normally.

Perhaps abstractions/kerberosclient should be amended to have a deny
rule for /etc/krb5.conf w, to silence this needless noise.

Sadly, the kernel LSM design doesn't allow LSM modules to know the
difference between open("file", O_RDWR) and access('file", R_OK|W_OK);
both result in the same call to an LSM module. (Which makes a certain
amount of sense, but does mean polluting profiles with explicit 'deny'
rules on access() checks done for safety's sake.)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/228229

Title:
  sshd profile does not work out-of-the-box

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to