1 |
On Tue, May 31, 2016, at 10:44, Mick wrote: |
2 |
> On Tuesday 31 May 2016 16:30:27 James wrote: |
3 |
> > Here is an interesting read:: |
4 |
> > |
5 |
> > Security brief: CoreOS Linux Alpha remote SSH issue |
6 |
> > May 19, 2016 · By Matthew Garrett |
7 |
> > |
8 |
> > <snippets> |
9 |
> > |
10 |
> > Gentoo defaults to ending the PAM configuration with an optional pam_permit. |
11 |
> > |
12 |
> > This meant that failing both pam_unix and pam_sss on CoreOS systems would |
13 |
> > surprisingly result in authentication succeeding, and access being granted. |
14 |
> > |
15 |
> > The operator user was not used by CoreOS, but existed because it exists in |
16 |
> > the Gentoo Portage system from which CoreOS is derived. |
17 |
> > <end/snippets> |
18 |
> > |
19 |
> > Full read [1]. It kinda shows that CoreOS is derived from Gentoo |
20 |
> > and not ChromeOS; at least when time to blame a security lapse elsewhere.... |
21 |
> > |
22 |
> > |
23 |
> > enjoy, |
24 |
> > James |
25 |
> > |
26 |
> > [1] https://coreos.com/blog/ |
27 |
> |
28 |
> Does this mean we need to do anything to improve the security of our |
29 |
> systems? |
30 |
|
31 |
The interaction seems to be problematic when SSSD is introduced to the |
32 |
mix, as the SSSD documentation seems to assume a fallthrough to |
33 |
pam_permit.so. With a merely empty user password, I cannot trigger this |
34 |
issue. I will have to try with an expired account and a locked account |
35 |
later. |
36 |
|
37 |
the pam_permit.so line was introduced here: |
38 |
https://gitweb.gentoo.org/proj/pambase.git/commit/?id=ac9023eecfe3c13d212c548bb9d5d1b42a4e044b |
39 |
|
40 |
At the very least, it does seem like it ought to be pam_deny.so instead. |
41 |
|
42 |
I wonder if this issue is still even relevant for Kerberos users? |
43 |
https://bugs.gentoo.org/show_bug.cgi?id=333393 |