oss-sec mailing list archives
Re: polkitd service user privilege separation
From: Johannes Segitz <jsegitz () suse de>
Date: Fri, 31 Mar 2023 09:02:34 +0200
On Thu, Mar 30, 2023 at 02:08:10PM +0000, Jordan Glover wrote:
Is it valid conclusion that polkitd would be better of just running as root? That would clear any possible confusion. Or are there advantages of running it as separate "trusted" user?
It adds an additional step an attacker needs to take before having root privileges. Also it is not just about security, it also helps to limit the impact of non-security bugs. So I would keep the service user, but add clear language that explains that this isn't a meaningful security boundary and that this account needs to be considered to have root privileges. Johannes -- GPG Key EE16 6BCE AD56 E034 BFB3 3ADD 7BF7 29D5 E7C8 1FA0 Subkey fingerprint: 250F 43F5 F7CE 6F1E 9C59 4F95 BC27 DD9D 2CC4 FD66 SUSE Software Solutions Germany GmbH, Frankenstraße 146, 90461 Nürnberg, Germany Geschäftsführer: Ivo Totev, Andrew Myers, Andrew McDonald, Boudien Moerman (HRB 36809, AG Nürnberg)
Attachment:
signature.asc
Description: Digital signature
Current thread:
- polkitd service user privilege separation Johannes Segitz (Mar 29)
- Re: polkitd service user privilege separation Simon McVittie (Mar 29)
- Re: polkitd service user privilege separation Johannes Segitz (Mar 30)
- Re: polkitd service user privilege separation Jordan Glover (Mar 30)
- Re: polkitd service user privilege separation Johannes Segitz (Mar 31)
- Re: polkitd service user privilege separation Simon McVittie (Mar 29)