Re: System users and valid shells...

2006-05-11 Thread Jari Aalto
Uwe Hermann <[EMAIL PROTECTED]> writes: > On Fri, May 05, 2006 at 11:12:35AM +0300, Jari Aalto wrote: >> > The rest of the system accounts are happily running with /bin/false >> >> There is now /bin/nologin which is more secure > > I think you mean /usr/sbin/nologin, right? Please define "more sec

Re: System users and valid shells...

2006-05-10 Thread Manoj Srivastava
On 8 May 2006, Marc Haber outgrape: > On Fri, 05 May 2006 11:12:35 +0300, Jari Aalto > <[EMAIL PROTECTED]> > wrote: >> Richard A Nelson <[EMAIL PROTECTED]> writes: >>> On Wed, 3 May 2006, Colin Watson wrote: >>> The rest of the system accounts are happily running with >>> /bin/false >> >> There is

Re: System users and valid shells...

2006-05-09 Thread Javier Fernández-Sanguino Peña
On Mon, May 08, 2006 at 01:36:14AM +0200, Uwe Hermann wrote: > > Or does such a thing already exist? Not that I know of, such a report might be interesting... Regards Javier signature.asc Description: Digital signature

Re: System users and valid shells...

2006-05-09 Thread Javier Fernández-Sanguino Peña
On Mon, May 08, 2006 at 09:04:35AM +0200, Marc Haber wrote: > On Fri, 05 May 2006 11:12:35 +0300, Jari Aalto <[EMAIL PROTECTED]> > wrote: > >Richard A Nelson <[EMAIL PROTECTED]> writes: > >> On Wed, 3 May 2006, Colin Watson wrote: > >> The rest of the system accounts are happily running with /bin/f

Re: System users and valid shells...

2006-05-08 Thread Gabor Gombas
On Mon, May 08, 2006 at 12:47:53PM +0100, Thiemo Seufer wrote: > So you expect systems to become exploitable by mounting /usr as noexec > when they provide some /usr/bin/foo shell? Not actually "expect", but I would not be _that_ suprised. Most programs that care about the login shell tend to run

Re: System users and valid shells...

2006-05-08 Thread Thiemo Seufer
Gabor Gombas wrote: > On Mon, May 08, 2006 at 11:53:15AM +0100, Thiemo Seufer wrote: > > > Such a binary is completely broken, and it would fail in a similiar way > > for any sort of file it has no execute permission for, not only for > > $SHELL. > > Sure, but that does not change the fact that i

Re: System users and valid shells...

2006-05-08 Thread Gabor Gombas
On Mon, May 08, 2006 at 11:53:15AM +0100, Thiemo Seufer wrote: > Such a binary is completely broken, and it would fail in a similiar way > for any sort of file it has no execute permission for, not only for > $SHELL. Sure, but that does not change the fact that it is a failure path that is usuall

Re: System users and valid shells...

2006-05-08 Thread Thiemo Seufer
Gabor Gombas wrote: > On Mon, May 08, 2006 at 10:00:42AM +0100, Thiemo Seufer wrote: > > > > You can surely explain why /bin/nologin is more secure than > > > /bin/false. I'm eager to learn. > > > > I am curious why any of both would be more secure than /dev/null, a > > place which makes it hard

Re: System users and valid shells...

2006-05-08 Thread Gabor Gombas
On Mon, May 08, 2006 at 10:00:42AM +0100, Thiemo Seufer wrote: > > You can surely explain why /bin/nologin is more secure than > > /bin/false. I'm eager to learn. > > I am curious why any of both would be more secure than /dev/null, a > place which makes it hard to smuggle an infected binary into

Re: System users and valid shells...

2006-05-08 Thread Thiemo Seufer
Marc Haber wrote: > On Fri, 05 May 2006 11:12:35 +0300, Jari Aalto <[EMAIL PROTECTED]> > wrote: > >Richard A Nelson <[EMAIL PROTECTED]> writes: > >> On Wed, 3 May 2006, Colin Watson wrote: > >> The rest of the system accounts are happily running with /bin/false > > > >There is now /bin/nologin whic

Re: System users and valid shells...

2006-05-08 Thread Marc Haber
On Fri, 05 May 2006 11:12:35 +0300, Jari Aalto <[EMAIL PROTECTED]> wrote: >Richard A Nelson <[EMAIL PROTECTED]> writes: >> On Wed, 3 May 2006, Colin Watson wrote: >> The rest of the system accounts are happily running with /bin/false > >There is now /bin/nologin which is more secure You can surely

Re: System users and valid shells...

2006-05-07 Thread Uwe Hermann
Hi, thanks for the pointers, I'll read the old discussions ASAP... On Wed, May 03, 2006 at 01:48:33PM +0200, Javier Fernández-Sanguino Peña wrote: > AFAIK, this is already being done in Red Hat, SuSE, FreeBSD and OpenBSD for > many system users. I'm currently installing tons of distributions on

Re: System users and valid shells...

2006-05-07 Thread Uwe Hermann
Hi, On Fri, May 05, 2006 at 11:12:35AM +0300, Jari Aalto wrote: > > The rest of the system accounts are happily running with /bin/false > > There is now /bin/nologin which is more secure I think you mean /usr/sbin/nologin, right? Please define "more secure" in this context. Uwe. -- Uwe Herman

Re: System users and valid shells...

2006-05-05 Thread Jari Aalto
Richard A Nelson <[EMAIL PROTECTED]> writes: > On Wed, 3 May 2006, Colin Watson wrote: > > > The rest of the system accounts are happily running with /bin/false > There is now /bin/nologin which is more secure Jari -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe".

Re: System users and valid shells...

2006-05-03 Thread Nicolas François
On Wed, May 03, 2006 at 01:48:33PM +0200, Javier Fernández-Sanguino Peña wrote: > > In any case, you could use noshell (already available in Debian) or nologin > (see #298782) instead of /bin/false. nologin is now distributed with login. I've closed the ITP. Kind Regards, -- Nekral -- To UNS

Re: System users and valid shells...

2006-05-03 Thread Javier Fernández-Sanguino Peña
On Wed, May 03, 2006 at 02:45:56AM +0200, Uwe Hermann wrote: > Security-wise it's probably a good idea to give as few users as possible > a valid shell, all others should get /bin/false, right? AFAIK, this is already being done in Red Hat, SuSE, FreeBSD and OpenBSD for many system users. And is th

Re: System users and valid shells...

2006-05-03 Thread Marco d'Itri
On May 03, Uwe Hermann <[EMAIL PROTECTED]> wrote: > I get tons of warnings like this when I run tiger(8): Tools like this need to generate lots of warnings or people may start thinking that they are useless... > Security-wise it's probably a good idea to give as few users as possible > a valid sh

Re: System users and valid shells...

2006-05-02 Thread Richard A Nelson
On Wed, 3 May 2006, Colin Watson wrote: On Wed, May 03, 2006 at 02:45:56AM +0200, Uwe Hermann wrote: this may be a dumb question, but I really wonder if there's a policy (which I obviously haven't found) about which system users should get a valid shell and which shouldn't. Yeah, I had the sa

Re: System users and valid shells...

2006-05-02 Thread Colin Watson
On Wed, May 03, 2006 at 02:45:56AM +0200, Uwe Hermann wrote: > this may be a dumb question, but I really wonder if there's a policy > (which I obviously haven't found) about which system users should get > a valid shell and which shouldn't. This is bug #330882, and is basically because I'm excepti

System users and valid shells...

2006-05-02 Thread Uwe Hermann
Hi, this may be a dumb question, but I really wonder if there's a policy (which I obviously haven't found) about which system users should get a valid shell and which shouldn't. I get tons of warnings like this when I run tiger(8): NEW: --WARN-- [pass014w] Login (bin) is disabled, but has a vali