-
Notifications
You must be signed in to change notification settings - Fork 170
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fcos.filesystem: add sssd helpers to setuid filter #2046
Conversation
SSSD is moving to running as its own system user instead of as root. Part of this move involves adding setuid helpers with mode 4750 in order to read some privileged information before dropping privs. Those files trigger our setuid filter. Add them to the list.
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: jlebon The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@pbrezina Does that sound accurate? I based the above off of https://sssd.io/docs/design_pages/not_root_sssd.html, though couldn't find the source for that file in the repo itself (wanted to |
I can't comment on that page but suid binaries are really just a dangerous idea in general. They're a huge attack surface. For this use case instead, the monitor process can expose an internal API (e.g. over a socketpair) that runs something privileged and passes its output to the requesting unprivileged process. |
Hmm this whitelist should probably move to fedora-coreos-config in misc-ro - and maybe even add direct support to rpm-ostree for whitelisting suid/fcaps binaries. |
@cgwalters I share your concerns. Let's see what the devs say and whether we can find a path forward long-term (though let's not block on it).
Yeah, I think we could move all of |
Merging for now but I'd like to see the sssd team followup on this. |
The setuid binaries got to Fedora by mistake, I will revert it soon. SSSD has limited support for running as non-rooot, we would like to make it fully supported and default in the future, but as of this moment it is not something we recommend. |
Ack thanks for following up. We should revert this PR as well once they're no longer there. |
There is a build on F33, 34 and rawhide that should no longer add setuid to those binaries. sssd-2.4.2-1 |
PR revert in #2050. |
SSSD is moving to running as its own system user instead of as root.
Part of this move involves adding setuid helpers with mode 4750 in order
to read some privileged information before dropping privs.
Those files trigger our setuid filter. Add them to the list.