More PATH fallout. Who decided this was a good idea?

Callum Lerwick seg at haxxed.com
Sat Dec 6 18:02:39 UTC 2008


On Sat, 2008-12-06 at 07:45 -0500, Steve Grubb wrote:
> On Saturday 06 December 2008 00:55:24 Jesse Keating wrote:
> >  These are required to be this way for our Common Criteria evaluations.
> >
> > Is the thought here that if the code can be executed by a non-root user,
> > the audit of the code would have to be far more strict?
> 
> No, it has more to do with the fact that we have to audit all attempts to 
> modify trusted databases - in this case, shadow. No one can use these tools 
> since they do not have the permissions required to be successful. So, we 
> remove the ability to use these tools so that we don't have to audit it. 

So "cat >> /etc/shadow" is audited?

> IOW, if we open the permissions, we need to make these become setuid root so 
> that we send audit events saying they failed.
> 
> 
> > I'm just curious what added security you really get.
> 
> Its not so much a security thing as much as its a certification thing. An 
> ordinary user cannot possibly use these tools since they do not have the 
> requisite permissions.

Yet "vi /etc/shadow" is okay? Is that audited? Its sounding like the
certification board's idea of "attempting to modify trusted databases"
is far detached from reality.

Unix security happens at the syscall layer and given the focus on the
filesystem, at the filesystem layer. If you're not auditing *every*
attempt to open() /etc/shadow at the syscall layer it sounds to me like
you are doing it wrong.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 197 bytes
Desc: This is a digitally signed message part
URL: <http://listman.redhat.com/archives/fedora-devel-list/attachments/20081206/1f706b35/attachment.sig>


More information about the fedora-devel-list mailing list