[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

Re: More PATH fallout. Who decided this was a good idea?

Steve Grubb wrote:
On Saturday 06 December 2008 00:55:24 Jesse Keating wrote:
 These are required to be this way for our Common Criteria evaluations.

Is the thought here that if the code can be executed by a non-root user,
the audit of the code would have to be far more strict?

No, it has more to do with the fact that we have to audit all attempts to 
modify trusted databases - in this case, shadow. No one can use these tools 
since they do not have the permissions required to be successful. So, we 
remove the ability to use these tools so that we don't have to audit it. 

IOW, if we open the permissions, we need to make these become setuid root so 
that we send audit events saying they failed.
No you don't, cause you said yourself filesystem-level auditing is still done.
So if someone tries to use usermod to modify /etc/passwd and hasn't the permissions it takes, it will be logged.
usermod is just another tool to modify /etc/passwd, ...
With exactly the same reasoning You could chmod 750 /bin/vi

I'm just curious what added security you really get.

Its not so much a security thing as much as its a certification thing. An 
ordinary user cannot possibly use these tools since they do not have the 
requisite permissions.


I understand that there may be many people who want that certification thing, but it's just another special use-case for Fedora.
And as we don't make everyone's desktop run free-ipa servers just because "modern operating systems must have directory servers", we also shouldn't make everyone's usermod 750 just because there may be some companies with some policy to use only certified software.
So I think the best way to satisfy the requirements for certification is with separate packages/scripts/options.

Attachment: signature.asc
Description: OpenPGP digital signature

[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]