Bug 120675 - default_contexts insecure
Summary: default_contexts insecure
Status: CLOSED NEXTRELEASE
Alias: None
Product: Fedora
Classification: Fedora
Component: policy
Version: rawhide
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact:
URL:
Whiteboard:
Keywords:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2004-04-12 21:39 UTC by Sean Middleditch
Modified: 2007-11-30 22:10 UTC (History)
0 users

(edit)
Clone Of:
(edit)
Last Closed: 2004-04-15 22:00:27 UTC


Attachments (Terms of Use)

Description Sean Middleditch 2004-04-12 21:39:48 UTC
The /etc/security/default_contexts file is mildly insecure as the
default login role/context is sysadm_r:sysadm_t, followed by
staff_r:staff_t and then user_r:user_t.

Users whom have staff/sysadm rights should not have these by default
upon login.  That makes it too easy to just be lazy and accept the
default, and end up doing normal user stuff they shouldn't be doing
with those roles/contexts.

Comment 1 Sean Middleditch 2004-04-12 21:45:00 UTC
additionally, is there a way to specify per-use what the default
context(s) are?  this would aid in support of primary roles in bug
#120571.  also would allow the login contexts to be a little more
"obvious", in that normal users with access to enhanced roles would
still be normal users as default, while a login as root could default
to sysadm_r:sysadm_t which probably makes more sense and is closer to
what users would expect.

Comment 2 Colin Walters 2004-04-15 22:00:27 UTC
This has been fixed in the upcoming policy package.

As for per-user defaults: yes, the user's .default-contexts file.



Note You need to log in before you can comment on or make changes to this bug.