|| ||Steve Grubb <sgrubb-AT-redhat.com>|
|| ||Re: More PATH fallout. Who decided this was a good idea?|
|| ||Sat, 6 Dec 2008 07:45:36 -0500|
|| ||Jesse Keating <jkeating-AT-redhat.com>|
On Saturday 06 December 2008 00:55:24 Jesse Keating wrote:
> These are required to be this way for our Common Criteria evaluations.
> Is the thought here that if the code can be executed by a non-root user,
> the audit of the code would have to be far more strict?
No, it has more to do with the fact that we have to audit all attempts to
modify trusted databases - in this case, shadow. No one can use these tools
since they do not have the permissions required to be successful. So, we
remove the ability to use these tools so that we don't have to audit it.
IOW, if we open the permissions, we need to make these become setuid root so
that we send audit events saying they failed.
> I'm just curious what added security you really get.
Its not so much a security thing as much as its a certification thing. An
ordinary user cannot possibly use these tools since they do not have the
fedora-devel-list mailing list
to post comments)