-
Notifications
You must be signed in to change notification settings - Fork 247
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
usertools: force local user for sssd process user #5867
Conversation
bd14579
to
aab9d32
Compare
aab9d32
to
adf5d68
Compare
There are memory leaks:
Did you try to run |
adf5d68
to
28615fc
Compare
Failure in debian is not related with my changes. From logs:
Moreover, I executed the CI on demand for debian and it works. So, @alexey-tikhonov I think you can do another round of reviews. |
Hi @ikerexxe, Probably, #5867 (comment) should be answered first. Imo, humber of changes can be reduced significantly (and thus some other comments will not require addressing). |
28615fc
to
9f9bcab
Compare
System hardening by forcing the sssd user to be loaded from a local database (/etc/passwd) instead of using any remote user. This could happen in very special conditions and might change the owner of the sssd databases and generate a denial of service. Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
user and allowed_uids options should be accessible via the files service of nsswitch.conf. Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
aed1b20
to
67a456f
Compare
Thanks for your patience, ACK. |
Thanks for investing so much time reviewing it and giving feedback. |
only local users can be configured in `allowed_uids` This check is now enforced - see #5867 Reviewed-by: Steeve Goveas <sgoveas@redhat.com>
only local users can be configured in `allowed_uids` This check is now enforced - see #5867 Reviewed-by: Steeve Goveas <sgoveas@redhat.com>
only local users can be configured in `allowed_uids` This check is now enforced - see SSSD#5867 Reviewed-by: Steeve Goveas <sgoveas@redhat.com>
only local users can be configured in `allowed_uids` This check is now enforced - see SSSD#5867 Reviewed-by: Steeve Goveas <sgoveas@redhat.com>
only local users can be configured in `allowed_uids` This check is now enforced - see SSSD#5867 Reviewed-by: Steeve Goveas <sgoveas@redhat.com>
only local users can be configured in `allowed_uids` This check is now enforced - see SSSD#5867 Reviewed-by: Steeve Goveas <sgoveas@redhat.com>
Hi @ikerexxe,
what was that special conditions? If we are talking about 'sssd user', wouldn't |
Hi, yes, it is about 3rd party modules as well. The issue was that with some special configuration it was possible that SSSD was not able to access its own cache files anymore, but I can't remember the details, maybe Iker still has the description of the special setup. There might be other solutions to fix it. But I think Jonathan's suggestion from the bugzilla ticket to use libnss_altfiles as a fallback is worth to consider as well. bye, |
I also agree. If SSSD is unable to find the user in the "standard" database it should fallback to the ones provided by libnss_altfiles. |
Sumit, what do you mean "to use libnss_altfiles as a fallback"? I read his comment as "let glibc do it's job, just refrains from resolving this user in SSSD" (and this is exactly what
And when RHCOS switches to |
System hardening by forcing the sssd user to be loaded from a local database (/etc/passwd) instead of using any remote user. This could happen in very special conditions and might change the owner of the sssd databases and generate a denial of service.
Moreover, clarify user option in sssd.conf, as it accepts both the user name and the id as input. The only constraint is that the user should be present in the local database (/etc/passwd).