-
Notifications
You must be signed in to change notification settings - Fork 256
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PROXY: strip SUID bit off 'proxy_child' #7134
Conversation
bd49ac8
to
6abe198
Compare
FWIW, a run --with-sssd-user=sssd and system tests using sssd.conf::user=sssd is available in #7135 Besides "hardening in general", this change (among other '*_child' related changes) is needed to allow to use "SecureBits=noroot noroot-locked" in 'sssd.service' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ack thank you. Should there be a release note?
I think "support of running under non-privileged user" should have a huge, holistic release note. |
Take a note this makes 'proxy_child' binary readable/executable by anyone (the same as 'p11_child' or 'oidc_child', for example). But I don't think this is an issue. |
You also need to change it in makefile: https://github.com/SSSD/sssd/blob/master/Makefile.am#L5539 |
6abe198
to
cb76be1
Compare
'proxy' provider can be used to load arbitrary modules that might (or might not) require specific capabilities. Granting all capabilities unconditionally feels unjustified. One of the widely used options is proxy around 'libnss_files' that doesn't require any capabilities. Let administrator to set file capability manually if required in esoteric use cases.
cb76be1
to
a248e4f
Compare
Thanks, done. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi,
thanks for the patch, ACK.
bye,
Sumit
'proxy' provider can be used to load arbitrary modules that might
(or might not) require specific capabilities.
Granting all capabilities unconditionally feels unjustified. One of
the widely used options is proxy around 'libnss_files' that doesn't
require any capabilities. Let administrator to set file capability
manually if required in esoteric use cases.