> Essentially, this is a question about pam.
> 
> Not long ago I posted a message here asking if it was possible to set
> things up so that besides root, only one other particular user is made
> able to run /usr/sbin/pppd without the use of a password.  I did not
> want to make pppd suid or be forced to do it via su (which requires
> root password) or sudo (which requires it be installed and requires
> the user's password unless configured for NOPASS).

The hoops you went through go to illustrate what a woeful security mechanism 
PAM is.

A better system (and it's been around for 20 years or so that I know of) 
requires no changes to programs to secure them; the can even be on public view.

The security manager would issue a command that goes something like this:
grant user(tony) program(usr/sbin/pppd) access(exec);

and Tony could use pppd, but can't read it, copy it or do anything to see 
what's in it.

There would also have been something like this:
grant program(/usr/sbin/pppd) device(/dev/ttyS?) access (read write);

Tony can't use the serial ports (unless there's a separate rule for him to do 
so), but pppd can.

Note I made up the syntax on the spot; I think the intention's clear.

Programs and other resources are secured because the security manager says so; 
programs do not need to have any hooks in them to enable security control.





_______________________________________________
Redhat-devel-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-devel-list

Reply via email to