Send kea-dev mailing list submissions to
        [email protected]

To subscribe or unsubscribe via the World Wide Web, visit
        https://lists.isc.org/mailman/listinfo/kea-dev
or, via email, send a message with subject or body 'help' to
        [email protected]

You can reach the person managing the list at
        [email protected]

When replying, please edit your Subject line so it is more specific
than "Re: Contents of kea-dev digest..."


Today's Topics:

   1.  Kea - root privileges and security ? (Chaigneau, Nicolas)
   2. Re:  Kea - root privileges and security ? (Francis Dupont)


----------------------------------------------------------------------

Message: 1
Date: Thu, 1 Oct 2015 15:13:13 +0000
From: "Chaigneau, Nicolas" <[email protected]>
To: "[email protected]" <[email protected]>
Subject: [kea-dev] Kea - root privileges and security ?
Message-ID:
        
<ab94b0b675bdf14189cd5a861db36c842c4c1...@de-cm-mbx26.corp.capgemini.com>
        
Content-Type: text/plain; charset="us-ascii"

Hello guys,


It has been pointed out to me that Kea being executed with root privileges 
might cause security vulnerabilities.
I believe this to be a valid concern, but I'm not sure if there is much we can 
do about this.

I understand that a DHCP server needs root privileges for a number of actions: 
to open / use raw sockets, bind on privileged ports 67 / 68, and maybe more.

I was wondering if it could be feasible for the process to drop its root 
privileges (through seteuid ?), and only restore them when it actually needs 
them.

Maybe this doesn't make sense. Probably it would be complicated.
In any case, I'd like to hear your opinion on the matter. :)


For example, CMU's dhcpd (not ISC's !) seem to implement such a feature (see 
"running as an unprivileged user"):
https://www.net.princeton.edu/software/dhcpd/dhcpd.8.html
(note that I don't know anything about their product, except what I've read 
from their documentation)




Any thoughts ?


Regards,
Nicolas.

This message contains information that may be privileged or confidential and is 
the property of the Capgemini Group. It is intended only for the person to whom 
it is addressed. If you are not the intended recipient, you are not authorized 
to read, print, retain, copy, disseminate, distribute, or use this message or 
any part thereof. If you receive this message in error, please notify the 
sender immediately and delete all copies of this message.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
<https://lists.isc.org/pipermail/kea-dev/attachments/20151001/7caf5386/attachment-0001.html>

------------------------------

Message: 2
Date: Thu, 01 Oct 2015 15:44:07 +0000
From: Francis Dupont <[email protected]>
To: "Chaigneau, Nicolas" <[email protected]>
Cc: "[email protected]" <[email protected]>
Subject: Re: [kea-dev] Kea - root privileges and security ?
Message-ID: <[email protected]>
Content-Type: text/plain; charset="us-ascii"

"Chaigneau, Nicolas" writes:
> It has been pointed out to me that Kea being executed with root privileges =
> might cause security vulnerabilities.
> I believe this to be a valid concern, but I'm not sure if there is much we =
> can do about this.
> 
> I understand that a DHCP server needs root privileges for a number of actio=
> ns: to open / use raw sockets, bind on privileged ports 67 / 68, and maybe =
> more.

=> yes, a DHCP server must have privileges at least at startup.

> I was wondering if it could be feasible for the process to drop its root pr=
> ivileges (through seteuid ?), and only restore them when it actually needs =
> them.

=> it is possible to drop them but not to restore them (if you can restore
a privilege it was not really dropped).

> Maybe this doesn't make sense. Probably it would be complicated.
> In any case, I'd like to hear your opinion on the matter. :)

=> there are some attempts for a finer privilege control than root user
but IMHO they are more for a shared computer than what we have
(and only have in the future), i.e., a dedicated virtual machine.
So my opinion is that there are a lot of better places where one
should put money and/or man power to improve the security.

> For example, CMU's dhcpd (not ISC's !) seem to implement such a feature (se=
> e "running as an unprivileged user"):
> https://www.net.princeton.edu/software/dhcpd/dhcpd.8.html
> (note that I don't know anything about their product, except what I've read=
>  from their documentation)

=> it is not a real security feature because of:
  "Note that while this feature makes it less convenient to exploit the
   server's root privileges if there are any bugs present in the server,
   it does not provide complete protection, since the server still retains
   a real uid of root."
in fact it is more a measure to limit side effects of bugs.

Regards

Francis Dupont <[email protected]>


------------------------------

_______________________________________________
kea-dev mailing list
[email protected]
https://lists.isc.org/mailman/listinfo/kea-dev

End of kea-dev Digest, Vol 19, Issue 1
**************************************

Reply via email to