Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Limit permissions of /etc/sudoers.d #6

Closed
sprat opened this issue Apr 13, 2020 · 6 comments
Closed

Limit permissions of /etc/sudoers.d #6

sprat opened this issue Apr 13, 2020 · 6 comments
Milestone

Comments

@sprat
Copy link
Contributor

sprat commented Apr 13, 2020

For security purpose, the permissions of /etc/sudoers.d should probably be set to 0750. It would be a nice addition to the role. If you agree with that, I can probably make a pull request.

@tersmitten
Copy link
Member

I'm not against it, but would it be better to leave it to the package maintainer to decide?

@tersmitten
Copy link
Member

We don't create the directory

@tersmitten
Copy link
Member

And the files inside are already safe (0440)

@sprat
Copy link
Contributor Author

sprat commented Apr 14, 2020

Yes, the files are safe but not the directory, and it was reported as a security warning by lynis, probably because a malicious user can obtain some information about the available users by listing the directory. That's why I reported this problem. It can probably be an option in the role, so that the end-user can decide if he wants to change the permissions or keep the permissions as is.

@tersmitten
Copy link
Member

Renamed it to sudoers_sudoers_d_directory_mode.

Thanks for the addition!

@sprat
Copy link
Contributor Author

sprat commented Apr 17, 2020

Thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants