Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fingerprint auth should not be enabled for sudo #207

Closed
benzea opened this issue Apr 29, 2020 · 11 comments
Closed

Fingerprint auth should not be enabled for sudo #207

benzea opened this issue Apr 29, 2020 · 11 comments

Comments

@benzea
Copy link

benzea commented Apr 29, 2020

Fingerprint auth really doesn't make any sense for sudo (it is pretty harmful there). I doubt it should be enabled for anything but graphical logins.

@jamescassell
Copy link

I've definitely used it for sudo. Much better than NOPASSWD:, PITA to type password for sudo.

@benzea
Copy link
Author

benzea commented Apr 29, 2020

It is a bad idea. It completely breaks e.g. remoting in through ssh and it also doesn't really proof as much as a password does.

@benzea
Copy link
Author

benzea commented Apr 29, 2020

@jamescassell
Copy link

Seems like we need a pam module to detect local console auth vs remote

@pbrezina
Copy link
Member

pbrezina commented May 6, 2020

@benzea Do you use fprintd for other services? Or you don't use it at all?

@benzea
Copy link
Author

benzea commented May 6, 2020

I don't use fingerprint authentication at all ;-)

But, if I used it, I would expect it to only work from my graphical session. And, really, I would want policy to only allow unlock if other conditions are met (such policy does not exist obviously).

@pbrezina
Copy link
Member

pbrezina commented May 6, 2020

@benzea You can call authselect disable-feature with-fingerprint to remove the fingerprint module, but I suppose you already know this.

I discussed this with @t8m and it looks like best option will be to modify fprintd to add a check for presence of SSH_* environments variables. I need to check if sudo won't remove this during pam authentication though.

@hadess
Copy link

hadess commented May 7, 2020

It is a bad idea. It completely breaks e.g. remoting in through ssh and it also doesn't really proof as much as a password does.

That's already fixed, we check for local systemd sessions since the sd-bus port.

@pbrezina
Copy link
Member

Sweet! @hadess Is it already released?

@hadess
Copy link

hadess commented May 11, 2020

Since January this year. It's in Fedora 32 now.

@pbrezina
Copy link
Member

Thank you. Therefore I'm inclining to close this thread since for me the issue was that sudo is delayed by fingerprint on ssh sessions.

@benzea If you feel that sudo-fingerprint support should be optional with fingerprint enabled, can you please open a thread on fedora-devel and see what the community has to say about it?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants