Hi all,

So, let me use this reply as a warp-up of my thoughts. Basically, I
agree to HKS argument. I also agree to David Lang's argument that some
degree of design change would be necessary to get the requested features
done 100% correct.

But, of course, it all depends on the effort required. And more security
is always welcome. So I took time out today to think about the options
and experiment a bit. I came to the conclusion that some improvement can
probably be made in short time. I experimentally implemented a new
$PrivDropToUser config directive, which basically issues a setuid() call
with the user in question. It is far from being bullet-proof and will
never be totally save without architecture changes. But I think it still
can considerably improve security and when we can achieve this with a
few hours of work, it's probably worth the effort (a bit more work would
improve its security, but I don't do this unless I get feedback it makes
sense at all).

HOWEVER, there are also some things that simply don't work out. For
example, imklog reads the proc file system under Linux and, even though
it is opened as root, these reads fail after dropping to another user.
There may be other issues, I have not further investigated that.

I have created a bugzilla enhancement request for it:

http://bugzilla.adiscon.com/show_bug.cgi?id=105

You may want to subscribe to that bug for updates. 

The experimental code is available here:

http://git.adiscon.com/?p=rsyslog.git;a=shortlog;h=refs/heads/droppriv

I would appreciate feedback

a) on the general issue
b) on the experimental code itself

Many thanks,
Rainer

On Tue, 2008-11-18 at 17:29 -0500, (private) HKS wrote:
> FWIW, while I believe this discussion is relevant and the security
> changes proposed are important, I don't see this as a high priority
> feature. The scripting language/syntax, greater performance, continued
> stability enhancements, and true RELP support are all far more
> important. As far as security goes, I would much rather see two-way
> host authentication than a chroot/unprivilieged framework implemented.
> 
> Of course, all of the above would be just fine with me.
> 
> -HKS
> _______________________________________________
> rsyslog mailing list
> http://lists.adiscon.net/mailman/listinfo/rsyslog
> http://www.rsyslog.com

_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com

Reply via email to