- From: Lamont Granquist <
>
- To:
- Subject: [chef] Re: RE: Re: Chef's sudo cookbook and the passwordless access
- Date: Sat, 14 Mar 2015 23:18:23 -0700
Title: RE: [chef] Re: Chef's sudo cookbook and the passwordless
access
On 3/14/15 10:24 PM, Kevin Keane
Subscription wrote:
"
type="cite">
I don't
think using the sudoers.d directory is a good idea, because
it is a security problem. There are two specific issues with
it.
First, a
hacker may be able to add his own file to the sudoers.d
directory. That would be a classic injection/privilege
escalation attack. Granted, it's a bit more difficult
because /etc/sudoers.d has permissions restricting it to
root, but since it is also managed by chef, there can still
be ways for a non-root user to insert a file into this
directory.
If an attacker can create a file in /etc/sudoers.d with arbitrary
content they can also create a file in /etc/cron.d with arbitrary
content and run a command as root via cron to give them a backdoor.
"
type="cite">
The bigger
issue is that there is no good way to automatically clean up
obsolete entries from the sudoers.d directory; you may end
up giving sudo access to people who should no longer have
it.
That's a solvable problem. The zap cookbook is one way.
"
type="cite">
From a
security standpoint, it is dramatically better to only have a
sudoers file and no include statement, especially not an
include of a directory.
Kevin Keane
The NetTech
http://www.4nettech.com
Our values: Privacy, Liberty, Justice
See https://www.4nettech.com/corp/the-nettech-values.html
-----Original message-----
From: tayworm
.
"><
>
Sent: Friday 13th March 2015 13:03
To:
">
Subject: [chef] Re: Chef's sudo
cookbook and the passwordless access
|
Archive powered by MHonArc 2.6.16.