On Tue, May 31, 2016, at 11:07, Max R.D. Parmer wrote:
> On Tue, May 31, 2016, at 10:44, Mick wrote:
> > On Tuesday 31 May 2016 16:30:27 James wrote:
> > >  Here is an interesting read::
> > > 
> > > Security brief: CoreOS Linux Alpha remote SSH issue
> > > May 19, 2016 ยท By Matthew Garrett
> > > 
> > > <snippets>
> > > 
> > > Gentoo defaults to ending the PAM configuration with an optional 
> > > pam_permit.
> > > 
> > > This meant that failing both pam_unix and pam_sss on CoreOS systems would
> > > surprisingly result in authentication succeeding, and access being 
> > > granted.
> > > 
> > > The operator user was not used by CoreOS, but existed because it exists in
> > > the Gentoo Portage system from which CoreOS is derived.
> > > <end/snippets>
> > > 
> > > Full read [1]. It kinda shows that CoreOS is derived from Gentoo
> > > and not ChromeOS; at least when time to blame a security lapse 
> > > elsewhere....
> > > 
> > > 
> > > enjoy,
> > > James
> > > 
> > > [1] https://coreos.com/blog/
> > 
> > Does this mean we need to do anything to improve the security of our
> > systems?
> 
> The interaction seems to be problematic when SSSD is introduced to the
> mix, as the SSSD documentation seems to assume a fallthrough to
> pam_permit.so. With a merely empty user password, I cannot trigger this
> issue. I will have to try with an expired account and a locked account
> later.
> 
> the pam_permit.so line was introduced here:
> https://gitweb.gentoo.org/proj/pambase.git/commit/?id=ac9023eecfe3c13d212c548bb9d5d1b42a4e044b
> 
> At the very least, it does seem like it ought to be pam_deny.so instead.
> 
> I wonder if this issue is still even relevant for Kerberos users?
> https://bugs.gentoo.org/show_bug.cgi?id=333393 
> 

Yeah -- doesn't work with a locked or expired account either.

Reply via email to