Conversation
9b31039 to
e98de2a
Compare
|
We have at least one use case where non-root users need to run cron (Nightingale Postgres nodes). I think this will break that? We would need some kind of allow-first rules to form a full access.conf like this, I think: # this one goes first just because it's specified first in the profile?
+ : root : LOCAL
# NEW: some kind of allow-first, which probably won't work with the current approach?
+ : postgres : cron crond
# deny-first rules
- : (all_disabled_usr) : ALL
- : cron crond : ALL
# allow rules
...
# deny rules
...Thoughts? |
|
@jakerundall Good question. I did test that the root@LOCAL line does always get added at the beginning. |
|
I did some testing since I needed an allow-first functionality on mforge for SVCPLAN-4203. Added it with: This didn't work, the ordering of the rules came after deny_first_rules in my testing. |
|
Further testing and ideas:
Therefore, I propose ef7cb86. This would ideally let Default Deny always be the first rule inserted, so the first run won't fail; and chaining Default Allow after Deny First should remove the race condition of both of them executing in the same Puppet run. |
3d84887 to
ef7cb86
Compare
|
@jjackzhn Can this be closed? It seems very old. |
Per security recommendation raised during ISL vetting. Currently implemented in Hiera for isl-control.
The goal with this is to prevent anything with LOCAL allowed from accessing cron.