From: Stephan Henningsen <stephan@asklandd.dk>
To: buildroot@busybox.net
Subject: [Buildroot] [PATCH 1/1] package/sudo: make adding 'sudo' group+rule optional
Date: Tue, 5 Nov 2019 23:42:29 +0100 [thread overview]
Message-ID: <20191105224229.20488-1-stephan@asklandd.dk> (raw)
From: Stephan Henningsen <stephan+buildroot@asklandd.dk>
I have concerns about the change that was made to my original patch;
Instead of having the 'sudo' group and sudoers rule enabled by the user
manually and thereby giving her concent, a change was made to apply the
option silently.
While I do understand that making this all default will make the user
experience a bit smoother, I fear that this won't be the case for
everyone.
My motivations for making it an option to begin with (and for this
follow-up patch) are the following:
1) Not everyone may be interested in the added rule to /etc/sudoers; it
may even conflict with a custom rule. For example if a custom rule was
added that does not prompt for user password, then the newly added rule,
which does prompt for user password, maybe break automated cronjobs that
rely on sudo for elevated priviledges without a password prompt.
2) Adding this group and rule is only one of many use-cases of the sudo
package; some people may prefer adding custom rules that only allow
certain well-known users (e.g. alice, bob) or certain system groups
(e.g. wheel, daemon) to become root. These users may have to manually
revert the changes now done to their /etc/sudoers.
3) If only a little, this addition adds to the size of the system's
attack surface, potentially inadvertently allowing users to become root.
4) Not everyone may be interested in the added non-standard system group
'sudo'; they may even have to manually revert the changes now done to
their /etc/groups to trim it.
5) We're chaning default behavior of a security-critical package that may
affect systems that have run in production of years.
Most of this is just speculation, of course. But the fact remains that
the default behavior of a package that deals with elevating user
priviledges has been changed, and for no real reason at all. "If it ain't
broke, don't fix it" certain seems fitting, I think.
Signed-off-by: Stephan Henningsen <stephan+buildroot@asklandd.dk>
---
package/sudo/Config.in | 13 +++++++++++++
package/sudo/sudo.mk | 2 ++
2 files changed, 15 insertions(+)
diff --git a/package/sudo/Config.in b/package/sudo/Config.in
index cbef15d67b..982a4ffaa8 100644
--- a/package/sudo/Config.in
+++ b/package/sudo/Config.in
@@ -9,3 +9,16 @@ config BR2_PACKAGE_SUDO
but still allow people to get their work done.
http://www.sudo.ws/sudo/
+
+if BR2_PACKAGE_SUDO
+
+config BR2_PACKAGE_SUDO_GROUP_AND_RULE
+ bool "add group 'sudo' and enable associated sudoers rule"
+ default n
+ help
+ Creates a group named 'sudo', and enables the following rule
+ in the /etc/sudoers configuration file that allows members of
+ group 'sudo' to execute any command as root:
+
+ %sudo ALL=(ALL) ALL
+endif
diff --git a/package/sudo/sudo.mk b/package/sudo/sudo.mk
index 7d52eb0b57..b8c3924d8a 100644
--- a/package/sudo/sudo.mk
+++ b/package/sudo/sudo.mk
@@ -74,9 +74,11 @@ define SUDO_USERS
- - sudo -1 - - - -
endef
+ifeq ($(BR2_PACKAGE_SUDO_GROUP_AND_RULE),y)
define SUDO_ENABLE_SUDO_GROUP_RULE
$(SED) '/^# \%sudo\tALL=(ALL) ALL/s/^# //' $(TARGET_DIR)/etc/sudoers
endef
SUDO_POST_INSTALL_TARGET_HOOKS += SUDO_ENABLE_SUDO_GROUP_RULE
+endif
$(eval $(autotools-package))
--
2.17.1
next reply other threads:[~2019-11-05 22:42 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-11-05 22:42 Stephan Henningsen [this message]
2019-11-06 22:36 ` [Buildroot] [PATCH 1/1] package/sudo: make adding 'sudo' group+rule optional Thomas Petazzoni
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20191105224229.20488-1-stephan@asklandd.dk \
--to=stephan@asklandd.dk \
--cc=buildroot@busybox.net \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox