On Mon, Sep 22, 2014 at 05:13:32PM +0200, Jakub Hrozek wrote: > On Mon, Sep 22, 2014 at 03:58:50PM +0200, Jan Pazdziora wrote: > > On Mon, Sep 22, 2014 at 03:54:09PM +0200, Jakub Hrozek wrote: > > > > > > > > > > > Why eactly does the list of domains need to be protected by the list > > > > of uids? > > > > > > Apparently the rest of the PAM data can be faked by the client. > > > > How is that worse than the current situation when the client can pass > > "u...@domain.they.should.not.know.ABOUT" to pam_start? > > It's not worse, but the options aim at hardening the situation :) > > Currently, all processes are untrusted and all processes can access > whatever domain they want. With the proposed scheme, some UIDs can be > trusted to send PAM data because we know who that process is. These > processes can not only access all domains but also restrict themeselves > to a subset of domains. > > What is an untrusted process allowed to do is controlled by > a new proposed pam_allowed_auth_domains parameter. If you want only > trusted processes to access DOMAIN.THEY.SHOULD.NOT.KNOW.ABOUT you can > set: > > [sssd] > domains = public, DOMAIN.THEY.SHOULD.NOT.KNOW.ABOUT > > [pam] > pam_trusted_users = apache > pam_allowed_auth_domains = public > > and in /etc/pam.d/httpd: > pam_sss domains=DOMAIN.THEY.SHOULD.NOT.KNOW.ABOUT > > Now the apache user is able to access DOMAIN.THEY.SHOULD.NOT.KNOW.ABOUT > and all other users are only able to access the public domain. > > Makes sense?
Simo, does the design page reflect the discussion accurately? Can we start on the implementation? _______________________________________________ sssd-devel mailing list sssd-devel@lists.fedorahosted.org https://lists.fedorahosted.org/mailman/listinfo/sssd-devel