-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Silent failure when selecting bash as login shell for non-admin user #616
Comments
IIRC, it was done that way to just not have to worry about it until we knew the config was always NACM-validated (independent of the front-end used). Now that that should be fixed, we can probably move that restriction from being hard-coded in |
But why block bash at all? |
Because I don't think we're at the point where we've thought about all the possible local privilege escalation vectors that are accessible from Therefore, I think it makes sense to have some extra guardrails in place. Like I said, you should ideally be able to override those rules, but I think the added resistance of having to modify the defaul NACM setup first, is good to give a hint to the administrator that this is maybe not the best move from a security perspective. |
So adding a new UNIX user that should be able to SSH and check something we not have implemented in the CLI should not be possible by default? I personally think that is a little bit strange. Since you first (as an admin) add that user, if you give the user shell bash, that is of course a risk, that is always the case. But for now you have to make that kind of user admin, isn't that a stranger behavior? I do not see why you should not allow it, even since it may not be the best for security... |
AFK discussion. Two possible ways forward:
The third alternative seems like a simpler approach (for now). |
Added some security information in YANG model, and it is now up to the system administrator to handle potential security issues. This fix #616
Added some security information in YANG model, and it is now up to the system administrator to handle potential security issues. This fix #616
Added some security information in YANG model, and it is now up to the system administrator to handle potential security issues. This fix #616
Added some security information in YANG model, and it is now up to the system administrator to handle potential security issues. This fix #616
Added some security information in YANG model, and it is now up to the system administrator to handle potential security issues. This fix #616
Added some security information in YANG model, and it is now up to the system administrator to handle potential security issues. This fix #616
Added some security information in YANG model, and it is now up to the system administrator to handle potential security issues. This fix #616
Added some security information in YANG model, and it is now up to the system administrator to handle potential security issues. This fix #616
Added some security information in YANG model, and it is now up to the system administrator to handle potential security issues. This fix #616
Added some security information in YANG model, and it is now up to the system administrator to handle potential security issues. This fix #616
I am running in the test system, and just applies this operation:
Show running:
but /etc/passwd:
This took me a while to figure out, then i look in the code and noticed it was only for admins. This validation should really move to YANG. Everything looked fine but it didn't work as expected.
Or why block /bin/bash for non-admin users at all, it should be up for the user to select it and take consequences for him (if any, each use-case is different)
The text was updated successfully, but these errors were encountered: