Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fcos.filesystem: add sssd helpers to setuid filter #2046

Merged
merged 1 commit into from
Feb 17, 2021

Conversation

jlebon
Copy link
Member

@jlebon jlebon commented Feb 16, 2021

SSSD is moving to running as its own system user instead of as root.
Part of this move involves adding setuid helpers with mode 4750 in order
to read some privileged information before dropping privs.

Those files trigger our setuid filter. Add them to the list.

SSSD is moving to running as its own system user instead of as root.
Part of this move involves adding setuid helpers with mode 4750 in order
to read some privileged information before dropping privs.

Those files trigger our setuid filter. Add them to the list.
@openshift-ci-robot
Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: jlebon

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@jlebon
Copy link
Member Author

jlebon commented Feb 16, 2021

@pbrezina Does that sound accurate? I based the above off of https://sssd.io/docs/design_pages/not_root_sssd.html, though couldn't find the source for that file in the repo itself (wanted to git annotate it), which is a bit puzzling.

@cgwalters
Copy link
Member

I can't comment on that page but suid binaries are really just a dangerous idea in general. They're a huge attack surface. For this use case instead, the monitor process can expose an internal API (e.g. over a socketpair) that runs something privileged and passes its output to the requesting unprivileged process.

@cgwalters
Copy link
Member

Hmm this whitelist should probably move to fedora-coreos-config in misc-ro - and maybe even add direct support to rpm-ostree for whitelisting suid/fcaps binaries.

@jlebon
Copy link
Member Author

jlebon commented Feb 16, 2021

@cgwalters I share your concerns. Let's see what the devs say and whether we can find a path forward long-term (though let's not block on it).

Hmm this whitelist should probably move to fedora-coreos-config in misc-ro - and maybe even add direct support to rpm-ostree for whitelisting suid/fcaps binaries.

Yeah, I think we could move all of fcos.filesystem there.

@cgwalters
Copy link
Member

Merging for now but I'd like to see the sssd team followup on this.

@pbrezina
Copy link

@pbrezina Does that sound accurate? I based the above off of https://sssd.io/docs/design_pages/not_root_sssd.html, though couldn't find the source for that file in the repo itself (wanted to git annotate it), which is a bit puzzling.

The setuid binaries got to Fedora by mistake, I will revert it soon. SSSD has limited support for running as non-rooot, we would like to make it fully supported and default in the future, but as of this moment it is not something we recommend.

@jlebon
Copy link
Member Author

jlebon commented Feb 18, 2021

@pbrezina Does that sound accurate? I based the above off of sssd.io/docs/design_pages/not_root_sssd.html, though couldn't find the source for that file in the repo itself (wanted to git annotate it), which is a bit puzzling.

The setuid binaries got to Fedora by mistake, I will revert it soon. SSSD has limited support for running as non-rooot, we would like to make it fully supported and default in the future, but as of this moment it is not something we recommend.

Ack thanks for following up. We should revert this PR as well once they're no longer there.

@pbrezina
Copy link

pbrezina commented Feb 19, 2021

There is a build on F33, 34 and rawhide that should no longer add setuid to those binaries. sssd-2.4.2-1

@jlebon
Copy link
Member Author

jlebon commented Feb 19, 2021

PR revert in #2050.

@jlebon jlebon deleted the pr/sssd-tweak branch April 22, 2023 23:35
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants