Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <aERKro-d7hVgtV4v@remnant.pseudorandom.co.uk>
Date: Sat, 7 Jun 2025 15:20:30 +0100
From: Simon McVittie <smcv@...ian.org>
To: oss-security@...ts.openwall.com
Subject: Re: Linux kernel: HFS+ filesystem implementation
 issues, exposure in distros

On Fri, 06 Jun 2025 at 15:40:20 +0200, Attila Szasz wrote:
>Incidentally, I don't know how active user sessions in polkit and the
>state of being a sudoer vs non-sudoer works when you hook up workstations
>to AD, but it might be interesting.

Active vs. inactive vs. non-local user sessions in polkit are usually 
orthogonal to whether you're root-equivalent, and are orthogonal to 
whether your uid is defined by /etc/passwd or by some remote service.
If you logged in on the console (getty, xdm, gdm or similar) and your 
session is still the one in the foreground (it wasn't put in the 
background by "fast user switching" or Ctrl+Alt+function keys), then you 
are said to have an active local session.

The interesting property of active local sessions in polkit is that by 
default various services let them do certain restricted things in order 
to meet reasonable user expectations, while not being fully 
root-equivalent. For instance unprivileged users are not normally 
allowed to shut down the machine (because that would compromise 
availability), but unprivileged users with an active local session *are* 
allowed to shut down the machine by default (on the assumption that a 
user who is physically in front of the computer could usually equally 
well cause denial of service by pulling the plug, so allowing them to 
shut down gracefully does not make anything worse). This can be 
overridden by local policy (the "pol" in the name polkit); for example 
sysadmins of "kiosk" machines that are physically protected from 
unauthorized disconnection should probably install local policy that 
does not allow active local sessions to shut down.

Similarly, service authors and sysadmins can conditionalize any default 
or non-default policy on whether a user has an active local session, if 
they want to - and it would be technically possible to install a policy 
that makes every active local user root-equivalent (live-boot images 
might potentially want to do this), although that would be an unwise 
thing to do on a general-purpose system.

If a user account's root-equivalence is given by group membership (e.g. 
on Debian, the conventional way to allow privilege elevation to root is 
by giving membership in the sudo group) then the decision to make it 
root-equivalent or not could come from either local configuration, or AD 
or similar remote services. If its root-equivalence comes from some 
other property (e.g. editing /etc/sudoers) then it's more likely to be a 
purely local fact.

     smcv

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.