Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 31 Mar 2023 09:02:34 +0200
From: Johannes Segitz <jsegitz@...e.de>
To: oss-security@...ts.openwall.com
Subject: Re: polkitd service user privilege separation

On Thu, Mar 30, 2023 at 02:08:10PM +0000, Jordan Glover wrote:
> Is it valid conclusion that polkitd would be better of just running as
> root? That would clear any possible confusion. Or are there advantages of
> running it as separate "trusted" user?

It adds an additional step an attacker needs to take before having root
privileges. Also it is not just about security, it also helps to limit the
impact of non-security bugs. So I would keep the service user, but add
clear language that explains that this isn't a meaningful security boundary
and that this account needs to be considered to have root privileges.

Johannes
-- 
GPG Key                EE16 6BCE AD56 E034 BFB3  3ADD 7BF7 29D5 E7C8 1FA0
Subkey fingerprint:    250F 43F5 F7CE 6F1E 9C59  4F95 BC27 DD9D 2CC4 FD66
SUSE Software Solutions Germany GmbH, Frankenstraße 146, 90461 Nürnberg, Germany
Geschäftsführer: Ivo Totev, Andrew Myers, Andrew McDonald, Boudien Moerman
(HRB 36809, AG Nürnberg)

Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.