Re: [Freeipa-devel] Sudo Schema Bug/Feature

2010-10-05 Thread Rob Crittenden
JR Aquino wrote: On Oct 4, 2010, at 2:02 PM, Rob Crittenden wrote: Dmitri Pal wrote: Dmitri Pal wrote: Dmitri Pal wrote: How do we adjust FreeIPA such that it ensures Deny-IPASudoRules precede any Allow-IPASudoRules ? So it looks like current schema would not fly well with SUDO due to

Re: [Freeipa-devel] Sudo Schema Bug/Feature

2010-10-04 Thread JR Aquino
On Oct 4, 2010, at 2:02 PM, Rob Crittenden wrote: > Dmitri Pal wrote: >> Dmitri Pal wrote: >>> Dmitri Pal wrote: >>> > How do we adjust FreeIPA such that it ensures Deny-IPASudoRules precede > any Allow-IPASudoRules ? > > > So it looks like current schema would not fl

Re: [Freeipa-devel] Sudo Schema Bug/Feature

2010-10-04 Thread JR Aquino
On Oct 4, 2010, at 2:02 PM, Rob Crittenden wrote: > Dmitri Pal wrote: >> Dmitri Pal wrote: >>> Dmitri Pal wrote: >>> > How do we adjust FreeIPA such that it ensures Deny-IPASudoRules precede > any Allow-IPASudoRules ? > > > So it looks like current schema would not fl

Re: [Freeipa-devel] Sudo Schema Bug/Feature

2010-10-04 Thread Rob Crittenden
Dmitri Pal wrote: Dmitri Pal wrote: Dmitri Pal wrote: How do we adjust FreeIPA such that it ensures Deny-IPASudoRules precede any Allow-IPASudoRules ? So it looks like current schema would not fly well with SUDO due to SUDO bug/feature. SUDO will match just any first rule that satisfies t

Re: [Freeipa-devel] Sudo Schema Bug/Feature

2010-10-04 Thread Dmitri Pal
Dmitri Pal wrote: > Dmitri Pal wrote: > >>> How do we adjust FreeIPA such that it ensures Deny-IPASudoRules precede any >>> Allow-IPASudoRules ? >>> >>> >>> >> So it looks like current schema would not fly well with SUDO due to SUDO >> bug/feature. SUDO will match just any first

Re: [Freeipa-devel] Sudo Schema Bug/Feature

2010-10-03 Thread Dmitri Pal
Dmitri Pal wrote: >> How do we adjust FreeIPA such that it ensures Deny-IPASudoRules precede any >> Allow-IPASudoRules ? >> >> > So it looks like current schema would not fly well with SUDO due to SUDO > bug/feature. SUDO will match just any first rule that satisfies the > user-hpost-comma

Re: [Freeipa-devel] Sudo Schema Bug/Feature

2010-09-30 Thread Dmitri Pal
> How do we adjust FreeIPA such that it ensures Deny-IPASudoRules precede any > Allow-IPASudoRules ? > So it looks like current schema would not fly well with SUDO due to SUDO bug/feature. SUDO will match just any first rule that satisfies the user-hpost-command combination but we can't guaran

Re: [Freeipa-devel] Sudo Schema Bug/Feature

2010-09-30 Thread JR Aquino
> btw. I cannot reproduce your issue where a command is denied where only > user and host is matching, can you give an example where this is > happening? Thanks I retract my previous statement and stand corrected: I have run a test and verified on Redhat Enterprise 5.5 that Sudo is behaving as w

Re: [Freeipa-devel] Sudo Schema Bug/Feature

2010-09-30 Thread JR Aquino
On Sep 30, 2010, at 9:37 AM, Sumit Bose wrote: > I agree, I only made the suggestion about the IPA server, because I > think that this "feature" is a bug in the current sudo code base, an > annoying bug at best and a serious security issue at worst. It is both a bug and a security concern... one

Re: [Freeipa-devel] Sudo Schema Bug/Feature

2010-09-30 Thread Sumit Bose
> On Sep 30, 2010, at 6:17 AM, > mailto:freeipa-devel-requ...@redhat.com>> > mailto:freeipa-devel-requ...@redhat.com>> > wrote: > > I think this behaviour is a contradiction to 'paranoid behavior'. I > think that instead of > > 'If there are conflicting command rules on an entry, the negative

Re: [Freeipa-devel] Sudo Schema Bug/Feature

2010-09-30 Thread JR Aquino
On Sep 30, 2010, at 6:17 AM, mailto:freeipa-devel-requ...@redhat.com>> mailto:freeipa-devel-requ...@redhat.com>> wrote: I think this behaviour is a contradiction to 'paranoid behavior'. I think that instead of 'If there are conflicting command rules on an entry, the negative takes precedence.'

Re: [Freeipa-devel] Sudo Schema Bug

2010-09-30 Thread JR Aquino
Todd was able to confirm this for me... On Sep 29, 2010, at 9:06 PM, Dmitri Pal wrote: I was aware of this writeup however I did not read it as there is a problem when there are multiple rules with negation. It actually nowhere says how SUDO handles multiple rules if they are mutually exclusive. E

Re: [Freeipa-devel] Sudo Schema Bug

2010-09-30 Thread Sumit Bose
On Thu, Sep 30, 2010 at 12:06:01AM -0400, Dmitri Pal wrote: > JR Aquino wrote: > > I have encountered and troubleshot several instances recently where a user > > was present in more than 1 sudo rule. One that permitted the user, the > > host, and commands, and another that permited the user, and

Re: [Freeipa-devel] Sudo Schema Bug

2010-09-29 Thread Dmitri Pal
JR Aquino wrote: > I have encountered and troubleshot several instances recently where a user > was present in more than 1 sudo rule. One that permitted the user, the host, > and commands, and another that permited the user, and host, but no commands. > > It was discovered that: > * Sudo is a s

Re: [Freeipa-devel] Sudo Schema Bug

2010-09-29 Thread JR Aquino
I have encountered and troubleshot several instances recently where a user was present in more than 1 sudo rule. One that permitted the user, the host, and commands, and another that permited the user, and host, but no commands. It was discovered that: * Sudo is a stop on first match... * When

Re: [Freeipa-devel] Sudo Schema Bug

2010-09-29 Thread Dmitri Pal
JR Aquino wrote: > I believe we have made an oversight in the way that sudo processes 'deny' or > negations via ldap... > > Currently our IPA sudo Schema has ipasudorule objects set to contain an > attribute: accessRuleType > > Unfortunately, sudo does not have a means to do a 'deny' in this way.

[Freeipa-devel] Sudo Schema Bug

2010-09-29 Thread JR Aquino
I believe we have made an oversight in the way that sudo processes 'deny' or negations via ldap... Currently our IPA sudo Schema has ipasudorule objects set to contain an attribute: accessRuleType Unfortunately, sudo does not have a means to do a 'deny' in this way... For a command, user, or h