Hi Alexander,

thanks for your patch. I am indeed reluctant to have OpenSSL added as a
dependency to sudo. This might open a can of worms; other team members
might give their opinion here as well.

And since we just are working on getting rid of sudo-ldap, having a
variant, sudo-ssl, would probably be too much as well.

I was not aware of sudo_logsrvd at all, since that's a daemon, it should
probably be in its own package (or disabled).

Would it be very unfriendly to indeed suggest using stunnel instead of
native SSL? What is a motivation to use sudo_logsrvd instead of normal
syslog?

Greetings
Marc

On Wed, Jan 03, 2024 at 09:49:37AM +0100, Alexander Reichle-Schmehl wrote:
> From: Alexander Reichle-Schmehl <a...@anguana.alphamar.org>
> Subject: Bug#1059896: sudo: Please add openssl support for sudo and
>  sudo_logsrvd for secure transfer of sudo log files
> To: Debian Bug Tracking System <sub...@bugs.debian.org>
> Reply-To: Alexander Reichle-Schmehl <a...@anguana.alphamar.org>,
>  1059...@bugs.debian.org
> Date: Wed, 03 Jan 2024 09:49:37 +0100
> X-Mailer: reportbug 7.10.3+deb11u1
> 
> Package: sudo
> Version: 1.9.5p2-3+deb11u1
> Severity: wishlist
> Tags: patch
> 
> Dear Maintainer,
> 
> sudo 1.9 introduced the functionality to directly send log files (especially
> input/output logs) to a log server.  As these logs might contain private data,
> they should be transfered using ssl.  Both sudo as well as sudo_logsrvd
> support this, when the feature is enabled at compile time.
> 
> I send merge request on salsa to add this functionality, and verified, that
> it works for me.
> 
> However, I should also point out, that an alternative approach would be to use
> stunnel. If you prefer that instead of adding additional complexity to an
> security critical package, would you consider adding a Readme file explaining
> how that's doen?  I use it for sudo an other distribution anyway, and could
> write one for you, if you prefer it that way.
> 
> 
> Best regards,
>   Alexander
> 
> 
> 
> -- System Information:
> Debian Release: 11.8
>   APT prefers oldstable-security
>   APT policy: (500, 'oldstable-security'), (500, 'oldoldstable-updates'), 
> (500, 'oldstable')
> Architecture: amd64 (x86_64)
> 
> Kernel: Linux 5.10.0-26-cloud-amd64 (SMP w/2 CPU threads)
> Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
> LANGUAGE=en_US:en
> Shell: /bin/sh linked to /bin/dash
> Init: systemd (via /run/systemd/system)
> LSM: AppArmor: enabled
> 
> Versions of packages sudo depends on:
> ii  libaudit1       1:3.0-2
> ii  libc6           2.31-13+deb11u7
> ii  libpam-modules  1.4.0-9+deb11u1
> ii  libpam0g        1.4.0-9+deb11u1
> ii  libselinux1     3.1-3
> ii  lsb-base        11.1.0
> ii  zlib1g          1:1.2.11.dfsg-2+deb11u2
> 
> sudo recommends no packages.
> 
> sudo suggests no packages.
> 
> -- Configuration Files:
> /etc/pam.d/sudo changed [not included]
> /etc/sudoers [Errno 13] Permission denied: '/etc/sudoers'
> /etc/sudoers.d/README [Errno 13] Permission denied: '/etc/sudoers.d/README'
> 
> -- no debconf information

Reply via email to