Andreas Jellinghaus wrote: > Am Mittwoch 28 Januar 2009 18:06:33 schrieb Alon Bar-Lev: > > On 1/28/09, Andreas Jellinghaus <a...@dungeon.inka.de> wrote: > > > > - Define policy for ACL (see freedesktop Bugzilla) > > > > > > root,root 0600 is fine with me. distributions could create some system > > > account, and use that system account for such usb devices and run pcscd > > > and openct under these accounts (if that works, not 100% sure here - > > > never tried). > > > > No. > > Should allow a group to access, such as root:usb 0660. > > This way you can add the openctd user (the user under which ifdhandler > > runs) to this group. > > someone has a group "usb"? ouch. I don't like this proposal. > > people might think "lets add a user to that group, like we do with audio > and video, so people can use usb devices". if then this would be implemented > like alon suggested, a user can access a device, that is required for login > authentication (if you configured smart card authentication). bad idea, at > minimum this could be a denial of service attack. not sure if claiming an > interface via usb control prevents every other process to see what you send > to and receive from that device, but I hope it does.
At least in openSUSE (and probably all other distros using HAL +PolicyKit), default handling of devices is "deny everything". Additional permissions are assigned: - To groups, if group concept is sufficient. In case of Smart Cards, it might be GID writability for "scard" group, allowing to run smart card daemon without root privileges. - Using ACL to locally logged users. It was discussed last week as the controversial direct access to selected readers, if selected applications are installed. > My recommendation stands: either run that software as root, or use a special > user for these access rights. (is there a special reason not to have some user > as the owner of the dynamically created device nodes? if so, a special group > with one user only could help, but it should not have a generic name. and I > don't know of any such reason) Yes. If the device will be identified as Smart Card device, GID write permission and ACL will be set by HAL+PolicyKit automatically. Smart card daemons don't need to care about it. > btw: many distributions have a group "scard" that regulates access to smart > card reader middleware (pcscd and openct). (well, ok, debian and ubuntu have > that group, not 100% sure about other distributions). openSUSE used "daemon" up to now. Security team recommended a dedicated group, so I will create "scard" as well and set policy accordingly. -- Best Regards / S pozdravem, Stanislav Brabec software developer --------------------------------------------------------------------- SUSE LINUX, s. r. o. e-mail: sbra...@suse.cz Lihovarská 1060/12 tel: +420 284 028 966, +49 911 740538747 190 00 Praha 9 fax: +420 284 028 951 Czech Republic http://www.suse.cz/ _______________________________________________ opensc-devel mailing list opensc-devel@lists.opensc-project.org http://www.opensc-project.org/mailman/listinfo/opensc-devel