![]() |
|
Message-ID: <aERKro-d7hVgtV4v@remnant.pseudorandom.co.uk> Date: Sat, 7 Jun 2025 15:20:30 +0100 From: Simon McVittie <smcv@...ian.org> To: oss-security@...ts.openwall.com Subject: Re: Linux kernel: HFS+ filesystem implementation issues, exposure in distros On Fri, 06 Jun 2025 at 15:40:20 +0200, Attila Szasz wrote: >Incidentally, I don't know how active user sessions in polkit and the >state of being a sudoer vs non-sudoer works when you hook up workstations >to AD, but it might be interesting. Active vs. inactive vs. non-local user sessions in polkit are usually orthogonal to whether you're root-equivalent, and are orthogonal to whether your uid is defined by /etc/passwd or by some remote service. If you logged in on the console (getty, xdm, gdm or similar) and your session is still the one in the foreground (it wasn't put in the background by "fast user switching" or Ctrl+Alt+function keys), then you are said to have an active local session. The interesting property of active local sessions in polkit is that by default various services let them do certain restricted things in order to meet reasonable user expectations, while not being fully root-equivalent. For instance unprivileged users are not normally allowed to shut down the machine (because that would compromise availability), but unprivileged users with an active local session *are* allowed to shut down the machine by default (on the assumption that a user who is physically in front of the computer could usually equally well cause denial of service by pulling the plug, so allowing them to shut down gracefully does not make anything worse). This can be overridden by local policy (the "pol" in the name polkit); for example sysadmins of "kiosk" machines that are physically protected from unauthorized disconnection should probably install local policy that does not allow active local sessions to shut down. Similarly, service authors and sysadmins can conditionalize any default or non-default policy on whether a user has an active local session, if they want to - and it would be technically possible to install a policy that makes every active local user root-equivalent (live-boot images might potentially want to do this), although that would be an unwise thing to do on a general-purpose system. If a user account's root-equivalence is given by group membership (e.g. on Debian, the conventional way to allow privilege elevation to root is by giving membership in the sudo group) then the decision to make it root-equivalent or not could come from either local configuration, or AD or similar remote services. If its root-equivalence comes from some other property (e.g. editing /etc/sudoers) then it's more likely to be a purely local fact. smcv
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.