<p>I think in summary what Robert M is trying to say here is FreeIPA should be secure by default rather than create a possible hole by default which can be fixed by tweaking a setting. Think of it as the difference between Windows and OpenBSD...I know which one I would rather be using to run my network.</p>
<p>IM(very)HO I believe he is correct that this should no longer be the default.</p>
<p>Just my thoughts,</p>
<p>Take care.</p>
<p>--<br>
Rob Lazzurs</p>
<p><blockquote>On 18 Nov 2008, 2:32 PM, "Robert Marcano" <<a href="mailto:robert@marcanoonline.com">robert@marcanoonline.com</a>> wrote:<br><br><p><font color="#500050">On Tue, 2008-11-18 at 08:39 -0500, Simo Sorce wrote:
> On Mon, 2008-11-17 at 20:03 -0430, Robert Mar...</font></p>...<br>
<p><font color="#500050">
> You should be able to change the default umask for users so that groups
> do not get permissions ...</font></p>Yes i know about the umask option, but if you are trying to deploy not<br>
only servers but Linux workstations, that must be done on each one of<br>
them, leaving the possibility of a security hole if you miss one of<br>
them. and things can be worse if you do not have control of all the<br>
servers (in my case i have servers from another company that I will only<br>
request them to be added to the IPA realm)<br>
<p><font color="#500050">
>
> The default umask can be changed in /etc/bashrc on Fedora and similar
> files on other distrib...</font></p>So, Freeipa create a (little) insecure environment by default. I<br>
understand that things must be made easy for the users but remember that<br>
making things easier can compromise security too. I think it is possible<br>
to make the GUI create the primary group on another part of the LDAP<br>
tree (like i do with samba machine posix accounts because I was worried<br>
like you are with the machine$ accounts cluttering the Web UI), I only<br>
needed to change the ldap configuration to get users from the common<br>
parent<br>
<br>
nss_base_passwd cn=accounts,dc=example,dc=com,dc=ve?sub<br>
<br>
this way the UI will not be cluttered with the primary groups<br>
<p><font color="#500050">
> Managing user/groups makes it more complex to create delete and rename
> existing users, as the r...</font></p>Well the simple adduser/removeuser script are able to do that (no<br>
rename), so I think it is feasible to replicate that on an LDAP<br>
environment<br>
<br>
What people think about this option? this is something that I will<br>
hopefully try to get sometime to help with, and could be the excuse to<br>
learn a little of python web development (I have no knowledge of<br>
TurboGears :-P)<br>
<p><font color="#500050">
>
> In case you find the you nonetheless want to create a group for each
> user you can use CLI to...</font></p>That is the temporary solution that I will propose here, but I am sad<br>
because it will not be very welcome, because we lose the integrated GUI<br>
(the primary reason we opted for freeipa)<br>
<br>
<br>
><br>
> Simo.<br>
<p><font color="#500050">>
_______________________________________________
Freeipa-users mailing list
Freeipa-users@redhat....</font></p></blockquote></p>