Bug 295341 - AUDIT-0: PolicyKit: please add set(g/u)id polkit-* helpers to /etc/permissions.*
Summary: AUDIT-0: PolicyKit: please add set(g/u)id polkit-* helpers to /etc/permissions.*
Status: RESOLVED WONTFIX
: 392513 (view as bug list)
Alias: None
Product: openSUSE 11.0
Classification: openSUSE
Component: Security (show other bugs)
Version: Factory
Hardware: Other Other
: P5 - None : Blocker (vote)
Target Milestone: ---
Assignee: Security Team bot
QA Contact: E-mail List
URL:
Whiteboard:
Keywords:
Depends on:
Blocks: 382158
  Show dependency treegraph
 
Reported: 2007-07-27 20:37 UTC by Kay Sievers
Modified: 2011-10-31 21:00 UTC (History)
6 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---
coolo: SHIP_STOPPER+


Attachments
patch to disable sysdeps_get_exe_for_pid (1.12 KB, patch)
2008-05-27 10:14 UTC, Ludwig Nussel
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Kay Sievers 2007-07-27 20:37:06 UTC
We need:
  %attr(2755,root,polkituser) %{_libexecdir}/polkit-grant-helper
working.

The package is in BETA, with that line disabled for now. Thanks!
Comment 1 Sebastian Krahmer 2007-07-30 14:05:06 UTC
I will take it.
Where is the source?
Comment 2 Kay Sievers 2007-07-30 14:07:31 UTC
PolicyKit checked into BETA.
Comment 3 Marcus Meissner 2007-07-30 15:25:41 UTC
/work/SRC/BETA/all/PolicyKit
Comment 4 Marcus Meissner 2007-07-31 06:29:55 UTC
Overnight it also gained a setuid root pam helper binary for unknown reasons.

we need to audit that one too.
Comment 5 Kay Sievers 2007-07-31 09:33:56 UTC
The whole PAM conversation to authenticate as the own user or as root has been split out to its own 200 lines helper, which doesn't have any other dependency.

For us at least, it needs root privileges to be able to read /etc/shadow or NIS passwords. Other distros, not using PAM, would like to use replace that part with their own binary here doing the authentication chat.

/work/SRC/BETA/all/PolicyKit has been updated to the latest version. Thanks!
Comment 6 Sebastian Krahmer 2007-08-01 14:30:22 UTC
So, we only talk about polkit-grant/ subdir and the library calls
it needs right?
Comment 7 Kay Sievers 2007-08-03 14:05:00 UTC
Yes, it is all about the invoked setgid binary, which creates the "auth cookie", which is read by the system-service.
Comment 9 Marcus Meissner 2007-08-06 12:02:25 UTC
I have installed the packages on "westernhagen" (10.3 alpha7, hal,policykit,consolekit taken from BETA)

-rwxr-sr-x 1 root polkituser 19117  4. Aug 13:51 /usr/lib64/PolicyKit/polkit-grant-helper
-rwsr-xr-x 1 root root       16401  4. Aug 13:51 /usr/lib64/PolicyKit/polkit-grant-helper-pam
Comment 10 Sebastian Krahmer 2007-08-07 09:36:21 UTC
The code itself does not look problematic.

However I do not like that all the suids/sgids are linked against
blown libs such as libdbus or glib and its dependencies. This will
cause trouble sooner or later.
Comment 11 Marcus Meissner 2007-08-08 09:43:39 UTC
Kay, are DBUS and GLIB dependencies necessary for both setgid/setuid helper
programs or can we avoid them?
Comment 12 Kay Sievers 2007-08-08 09:54:38 UTC
The separate setuid root binary exists only for the reason not to link these libraries while running as root and using pam.

It is only the setgid polkituser binary which links dbus and glib, and that isn't trivial to change.

ldd /usr/lib64/PolicyKit/polkit-grant-helper-pam
  libpam.so.0 => /lib64/libpam.so.0 (0x00002b213f159000)
  libc.so.6 => /lib64/libc.so.6 (0x00002b213f365000)
  libaudit.so.0 => /lib64/libaudit.so.0 (0x00002b213f6a9000)
  libdl.so.2 => /lib64/libdl.so.2 (0x00002b213f8be000)
  /lib64/ld-linux-x86-64.so.2 (0x0000555555554000)

ldd /usr/lib64/PolicyKit/polkit-grant-helper
  libpolkit.so.1 => /usr/lib64/libpolkit.so.1 (0x00002b3bce363000)
  libpolkit-dbus.so.1 => /usr/lib64/libpolkit-dbus.so.1 (0x00002b3bce56f000)
  libdbus-1.so.3 => /lib64/libdbus-1.so.3 (0x00002b3bce774000)
  libglib-2.0.so.0 => /usr/lib64/libglib-2.0.so.0 (0x00002b3bce9ad000)
  libc.so.6 => /lib64/libc.so.6 (0x00002b3bcec74000)
  libexpat.so.1 => /lib64/libexpat.so.1 (0x00002b3bcefb8000)
  /lib64/ld-linux-x86-64.so.2 (0x0000555555554000)
Comment 13 Sebastian Krahmer 2007-08-08 10:02:18 UTC
Although there are no immidiate bugs, we should try to avoid
new suid/sgid binaries.
Comment 14 Kay Sievers 2007-08-08 10:10:44 UTC
It is the alternative to the current polkit daemon running as root using dbus, using glib and pam, and talking to users.
Comment 15 Kay Sievers 2007-08-09 09:00:41 UTC
Reset NEEDINFO.
Comment 16 Andreas Jaeger 2007-08-11 08:44:07 UTC
PolicyKit does not build with the new permissions file:

Running chkstat with permissions and permissions.secure
found the following differences:

/usr/lib/PolicyKit/polkit-grant-helper-pam from RPMS/i586/PolicyKit-0.4-7.i586.rpm
/usr/lib/PolicyKit/polkit-grant-helper-pam should be root:root 0755. (wrong permissions 4755)

Ludwig, can you investigate, please?
Comment 17 Stephan Kulow 2007-08-11 10:54:29 UTC
Marcus fixed it now
Comment 18 Kay Sievers 2007-12-20 16:14:38 UTC
Please update permissions for PolicyKit 0.7, which has the following programs:
  %attr(2755,root,polkituser) %{_libexecdir}/polkit-set-default-helper
  %attr(2755,root,polkituser) %{_libexecdir}/polkit-read-auth-helper
  %attr(2755,root,polkituser) %{_libexecdir}/polkit-revoke-helper
  %attr(2755,root,polkituser) %{_libexecdir}/polkit-explicit-grant-helper
  %attr(2755,root,polkituser) %{_libexecdir}/polkit-grant-helper
  %attr(4750,root,polkituser) %{_libexecdir}/polkit-grant-helper-pam

Other packages depend on the updated version, would be nice if that could be done in time. Thanks!
Comment 19 Kay Sievers 2008-01-02 13:11:06 UTC
Package copied to STABLE. Please update permissions.
Comment 21 Kay Sievers 2008-01-03 12:35:49 UTC
All binaries are called by untrusted user processes and need to be able to access the PolicyKit database, therefore the setgid=polkituser. The pam helper needs to be setuid=root to verify passwords.

Sourcde files are here:
  src/polkit-dbus/polkit-set-default-helper.c
  src/polkit-dbus/polkit-read-auth-helper.c
  src/polkit-grant/polkit-revoke-helper.c
  src/polkit-grant/polkit-explicit-grant-helper.c
  src/polkit-grant/polkit-grant-helper.c
  src/polkit-grant/polkit-grant-helper-pam.c
Comment 22 Sebastian Krahmer 2008-01-14 09:30:15 UTC
Is westernhagen still set up with current PolicyKit?
Comment 23 Marcus Meissner 2008-01-14 09:32:58 UTC
no, westernhagen does not have it currently. (I also have no latest STABLE updates currently.)  Perhaps time to update ;)
Comment 24 Sebastian Krahmer 2008-01-14 09:38:48 UTC
I hope my user is allowed to invoke it, as it asks DBUS to do so.
Comment 25 Sebastian Krahmer 2008-01-14 13:23:34 UTC
polkit-set-default-helper: since its setgid, files created are
owned by calling user, thus file-content in /usr/local/lib/PolicyKit-public/
can be changed afterwards at any time; if thats not a problem.
So, the only reason why this needs 02755 is that it is able to move
files to this directory??
Comment 26 Kay Sievers 2008-01-14 18:12:20 UTC
I talked to the author: It is a known minor issue, which will be addressed soon. A user can not gain any privileges by changing the file content, it will just change the supplied defaults.
If we (SUSE) want to wait for the final fix, we can leave it without setgid for now and a call to change defaults will just fail, which should not prevent the current users to continue working.
Comment 27 Andreas Jaeger 2008-01-15 07:52:23 UTC
/usr/local/lib/PolicyKit-public/ looks wrong as well - it should not install in /usr/local at all.
Comment 28 Sebastian Krahmer 2008-01-15 08:59:08 UTC
/usr/local is my local compilation.

For now I dont see much reason to have it setgid, more or less
current installation is like having the directory mode 1777,
since files are user-owned anyway. They probably mean setuid polkituser.

Comment 29 JP Rosevear 2008-03-06 19:41:59 UTC
We have the powermanagement stuff as well as PackageKit, powermanagement, pulse audo and storage mounting all using policykit now.  The command line tools throw errors now and refuse to give info.  This also allows users not to do all or nothing with things like pluggable usb devices.

Given that, I don't think we can ship 11.0 without this change.
Comment 30 Marcus Meissner 2008-03-10 16:05:25 UTC
pulseaudio will and should just work fine without policykit answering.
(otherwise it is a bug)
Comment 31 Marcus Meissner 2008-03-10 16:30:28 UTC
hal mounting of removable devices works fine, without those additional setgid bits too.
Comment 32 Marcus Meissner 2008-03-10 16:38:39 UTC
well, not with gnome-mount ... 

gnome-mount has org.gnome.PolicyKit hardcoded, whiole the service is called
org.freedesktop.PolicyKit.

Comment 33 Marcus Meissner 2008-03-10 16:51:40 UTC
ah,. org.gnome.PolicyKit starts the /usr/lib64/PolicyKit-gnome/polkit-gnome-manager,
while org.freedesktop.PolicyKit is something else.

confusing at best.
Comment 34 Marcus Meissner 2008-03-10 16:52:56 UTC
The 464 file permissions do not help, if the user has write access thjey can just write into the file (ownership overrides above).


However, as /var/lib/PolicyKit is 770 for polkituser:polkitgroup, it is fine
(users should not be in polkitgroup).
Comment 35 Marcus Meissner 2008-03-10 17:25:04 UTC
To dispel more FUD, powersave does not need the GRANT mechanisms for all regular cases, except multisession shutdown/reboot.

And neither does regular removable storage mounting, as said previously.


However there are cases that need it, including PackageKit.


So I will discuss this further tomorrow and try to see a solution.
Comment 36 Marcus Meissner 2008-03-11 22:43:25 UTC
discussed and reviewed together with Ludwig.

We will add the setgid bits to the above listed grant helper binaries.

Currently in "easy" mode, but not in "secure" and "paranoid" yet.

-> Ludwig for inclusion into permission package.
Comment 37 Ludwig Nussel 2008-03-12 11:03:43 UTC
Will do. Could you please change the %_libexecdir to %_prefix/lib please? Having to specify all binaries twice sucks. There are bugs open to change the macro in rpm but it looks like it's intentionally broken..
Comment 38 Ludwig Nussel 2008-03-12 12:29:41 UTC
done for
/usr/lib/PolicyKit/polkit-set-default-helper   
/usr/lib/PolicyKit/polkit-read-auth-helper     
/usr/lib/PolicyKit/polkit-revoke-helper        
/usr/lib/PolicyKit/polkit-explicit-grant-helper
/usr/lib/PolicyKit/polkit-grant-helper         
/usr/lib/PolicyKit/polkit-grant-helper-pam     

Please change the use of %_libexecdir
Comment 39 Kay Sievers 2008-03-12 18:34:29 UTC
Submitted.
Comment 40 Kay Sievers 2008-04-09 09:26:20 UTC
(In reply to comment #25 from Sebastian Krahmer)
> polkit-set-default-helper: since its setgid, files created are
> owned by calling user, thus file-content in /usr/local/lib/PolicyKit-public/
> can be changed afterwards at any time; if thats not a problem.

http://gitweb.freedesktop.org/?p=PolicyKit.git;a=commitdiff;h=149a3df1926c24b51b0f0336ac051473aed980fe
Comment 41 Kay Sievers 2008-04-10 01:02:48 UTC
New version submitted:
  /work/src/done/STABLE/PolicyKit/

Please add:
  %{_prefix}/lib/PolicyKit/polkit-resolve-exe-helper
as:
  %attr(4755,root,polkituser)

Thanks!
Comment 42 Marcus Meissner 2008-04-10 09:10:16 UTC
what is this new helper used for?
Comment 43 Kay Sievers 2008-04-10 11:19:03 UTC
setuid root helper for PolicyKit to resolve /proc/$pid/exe symlinks

"Add constraints for exe and SELinux context when granting an
authorization. The way it works is that added constraints now look
like this:
  scope=always:action-id=org.freedesktop.hal.storage.mount-fixed:
  when=1197008218:auth-as=0:constraint=local:constraint=active:
  constraint=exe%3A%2Fusr%2Fbin%2Fgnome-mount
This is a bit icky to implement for mechanisms, like HAL, running
as an unprivileged user. The problem is that we can't resolve the
symlink /proc/pid/exe. On the other hands such mechanisms has the
authorization org.freedesktop.policykit.read already. So use that."

http://gitweb.freedesktop.org/?p=PolicyKit.git;a=commit;h=a8e46ceb39137582b0fbacb69fdfda72ae7139f8
Comment 44 Kay Sievers 2008-04-24 18:44:18 UTC
Please update the permissions, some things are not working as expected now.
Comment 45 Marcus Meissner 2008-04-24 19:18:07 UTC
this not a valid bugreport.

what is the error?

are you perhaps stumbling about the "does not create user problem" in beta1?
Comment 46 Kay Sievers 2008-04-24 19:22:58 UTC
You can not mount volumes which require authorization to mount them. This is a very real problem. There are probably other authorizations failing too.
Comment 47 Marcus Meissner 2008-04-24 19:36:07 UTC
Is this the beta1 "polkituser" missing problem?

What is the errormessage?

Is it truly missing the exe symlink reader? 
Comment 48 Kay Sievers 2008-04-24 19:41:47 UTC
Yes, it is. Mounting built-in drives does not work. Anyway, regardless of this specific bug, PolicyKit is broken without proper permissions.

  $ rpm -q PolicyKit
  PolicyKit-0.7.git20080410-3

  chmod u-s /usr/lib/PolicyKit/polkit-resolve-exe-helper
  makes it working as expected

HAL log:
polkit-resolve-exe-helper: cannot do setuid(0): Operation not permitted
polkit-resolve-exe-helper: cannot do setuid(0): Operation not permitted
polkit-resolve-exe-helper: cannot do setuid(0): Operation not permitted
polkit-resolve-exe-helper: cannot do setuid(0): Operation not permitted
21:37:32.258 [I] device.c:1894: Removing locks from ':1.7908'
pid 32199: rc=1 signaled=0: /usr/lib64/hal/hal-storage-mount
21:37:32.259 [I] hald_dbus.c:4042: No more methods in queue
21:37:32.259 [I] hald_dbus.c:4105: failed with 'org.freedesktop.Hal.Device.PermissionDeniedByPolicy' 
Comment 49 Thomas Biege 2008-04-28 13:12:29 UTC
Will have a look... 
Comment 55 Kay Sievers 2008-04-30 01:42:19 UTC
All callers pass a static size, large enough for the common case. The return value of readlink() is checked, and the call fails if it is truncated.

I can see nothing which would immediately need to be fixed.

The upstream author is informed, and will change it according to the suggestions, and we will get the changes with the next version update. Thanks!
Comment 56 Kay Sievers 2008-05-20 11:23:45 UTC
Still broken. Please adapt permissions.

  using action org.freedesktop.hal.storage.mount-fixed for uid 2702
  polkit-resolve-exe-helper: cannot do setuid(0): Operation not permitted
  polkit-resolve-exe-helper: cannot do setuid(0): Operation not permitted
Comment 57 Stephan Kulow 2008-05-21 09:21:18 UTC
*** Bug 392513 has been marked as a duplicate of this bug. ***
Comment 58 Ludwig Nussel 2008-05-21 13:20:34 UTC
The policykit source code documentation for polkit_sysdeps_get_exe_for_pid() clearly states that containts based on the calling program's name cannot be relied upon as firstly they can be easily circumvented by the user himself and secondly don't work for interpreted languages. Therefore those exe name constaints are no security feature, just annoyance. The feature should be patched away instead of adding a setuid binary that cannot fix it's shortcomings anyways.
Comment 59 Stephan Kulow 2008-05-26 16:12:39 UTC
Marcus, can I have an executive summary please? This is so far the only RC1 blocking bug.
Comment 60 Thomas Biege 2008-05-27 06:25:54 UTC
The helper's code is "ok" but what about comment #58?
Comment 61 Ludwig Nussel 2008-05-27 10:14:10 UTC
Created attachment 218263 [details]
patch to disable sysdeps_get_exe_for_pid
Comment 62 Stephan Kulow 2008-05-27 11:51:20 UTC
Kay, is this working for you? We need a decision asap if we go with PolicyKit or permissions ;(
Comment 63 Kay Sievers 2008-05-27 14:25:00 UTC
Nope, I will not apply that. Ludwig, get involved in upstream development, if you want to influence stuff. We are not going to change behaviour for no good reason.
Comment 64 Stephan Kulow 2008-05-27 14:35:09 UTC
that sounds like a bad interlock problem - as SUSE won't add suid permissions without good reasons.
Comment 65 Kay Sievers 2008-05-27 14:38:16 UTC
SUSE also does not patch upstream software, because someone does not like a feature, for no good reasons.
Comment 66 Thomas Biege 2008-05-27 14:40:10 UTC
The authorization scheme seems to be broken by design, it would not help adding a suid bit.
Comment 67 Kay Sievers 2008-05-27 16:40:22 UTC
Same for you, express your opinion on the upstream mailing list, not in this bug. The patch does not add any security, so it is not needed.

If there is no concern regarding the security of this binary, please adapt the permissions as requested, I will not remove any feature because you personally don't like it.
Comment 68 David Zeuthen 2008-05-27 17:15:34 UTC
(In reply to comment #58 from Ludwig Nussel)
> The policykit source code documentation for polkit_sysdeps_get_exe_for_pid()
> clearly states that containts based on the calling program's name cannot be
> relied upon as firstly they can be easily circumvented by the user himself and
> secondly don't work for interpreted languages.

It does however work for secure programs.

(In reply to comment #66)
> The authorization scheme seems to be broken by design, it would not help
> adding a suid bit.

I'm not sure what to make of this comment.
Comment 69 Marcus Meissner 2008-05-27 20:50:26 UTC
Coolo: Sorry for not answering sooner, I am in a training.

Executive summary:

1. It is not clear why mount.fixed permissions are required at all, Kay nor anyone else has not answered our several queries regarding this.

   This question needs to be answered first, all others depend on that one.


   Ability to mount fixed disks/partitions is definitely a critical security risk.


2. There is apparently no code in FACTORY exercising this for us to even look at.


3. The helper binary itself is fine in a self contained way.


4. The use of "exe" name checking does not help, if the user has control over this executable via LD_PRELOAD, PTRACE or other means. He can just inject any code into this binary. Davids comment regarding "secure" binary likely means that the user binary itself needs setgid/setuid permissions.

"exe" path name checking is not a security feature in any way and should not be handled as such, as the source code even says.

This is our integral concern regarding this.


5. We will NOT add setuid permissions to any random binary just because it is "fine by itself".
Comment 70 Kay Sievers 2008-05-28 07:37:17 UTC
Fixed disks are different from removable disks, because one could be able to access the secure data from other operating systems on a multi-boot box. Therefore, mounting fixed disks have their own policy, and require the root password. And it works fine.

Please stop this, it is so pointless. The "exe" check is an additional check, add not any "security feature", does not harm anything, and does not need "fixing" in any sense.
And again, get involved in upstream development, discuss the stuff there, if you want to influence what Linux is doing today. Otherwise please stop wasting my/our time.

I will refuse any of these patches, which makes SUSE different from all other distros. I will just assign package maintenance to the one who will apply it, and not care anymore. I'm so tired of these useless "discussions" which never lead to anything in the past.
Comment 71 David Zeuthen 2008-05-28 14:36:48 UTC
(In reply to comment #69 from Marcus Meissner)
> 1. It is not clear why mount.fixed permissions are required at all, Kay nor
> anyone else has not answered our several queries regarding this.
> 
>    This question needs to be answered first, all others depend on that one.

HAL allows you to mount "fixed" (e.g. partitions from non-hotpluggable disks that doesn't support removable media => typically windows, os x partitions) but that requires another authorization if it was non-fixed (e.g. partitions from hotpluggable OR removable disks). 

So in that case you get asked for the root password to do this. You can retain this authorization so you won't get asked for a password again. Which is the _sensible_ thing to do if you realize that users typing in passwords and getting interrupted by password dialogs is _bad_ "security". [1]

Anyway, distributions and/or sites can tweak this behaviour; for example

 # polkit-action --set-defaults-active org.freedesktop.hal.storage.mount-fixed auth_admin

will change the defaults such that the authorization can't be retained. All this works fine.

(And this is much more preferable than the rather useless patch you guys are shipping to PolicyKit-gnome (I found this out when I was meeting with Kay a few weeks ago) that just deselects the "retain authorization" checkbox... all that patch does is just to make the user type in his password again and again... Btw, I'd appreciate if you guys sent patches like that upstream so I don't have to explain why it's non-sense in a downstream bugzilla entry.)

>    Ability to mount fixed disks/partitions is definitely a critical security
> risk.

Depends on what OS you're shipping. If it's for a laptop this is definitely not true; clearly users wants to access files from the other OS on the laptop. However, if it's for a server it's definitely true. See the bug linked in [1] for more thoughts about this.

> 2. There is apparently no code in FACTORY exercising this for us to even look
> at.

Maybe you guys are still shipping a patch to HAL that hides all fixed disks (e.g. setting volume.ignore); I don't know. Either way, it works fine in Fedora and Ubuntu; I can happily mount my Windows and OS X partitions.

> 3. The helper binary itself is fine in a self contained way.
> 
> 
> 4. The use of "exe" name checking does not help, if the user has control over
> this executable via LD_PRELOAD, PTRACE or other means. He can just inject any
> code into this binary. Davids comment regarding "secure" binary likely means
> that the user binary itself needs setgid/setuid permissions.

Yes, that's what I meant with "secure" binary; it's shorter to write "secure binary" than go through a (non-exhaustive) list of what attack vectors to cover.

> 
> "exe" path name checking is not a security feature in any way and should not be
> handled as such, as the source code even says.

It's not really a security feature, I don't know where you got that idea from. Clearly, this bit should tell you otherwise

http://hal.freedesktop.org/docs/PolicyKit/polkit-polkit-sysdeps.html#polkit-sysdeps-get-exe-for-pid

However it _is_ useful for binaries that can be securely locked down. 

For the record, it's exactly the same approach that AppArmor and SELinux takes; e.g. in SELinux you can tag a process as running in a security context (through xattrs of the binary) and that way it can do more syscalls than other processes / get more privileges. Ditto with AppArmor, it just happens to be path-based. And surely such processes are just as vulnerable to code injection as other programs.. except that glibc secure mode and other bits kick in so you can't ptrace the process nor use LD_PRELOAD etc. But that still leaves plenty other attack vectors (e.g. PYTHONPATH, GTK_MODULES etc.). 

The "only" difference here is that PolicyKit is purely application based; the mechanism is exactly the same: you look at characteristics of the process wanting to access something to make a decision.

So if you're saying "omg, that exe thing is evil", I think you should examine how AppArmor works.

Hope this clarifies.

      David

[1] : the whole point of PolicyKit is absolutely not the password dialogs; users should simply have the authorizations they need to do their work / use their system. They should certainly *not* be interrupted by password dialogs. I'd go as far as saying that passwords dialog are evil and a disease. It's, for the most cases, bad security (trusted path is the exception). Anyway, there's a slightly longer and more detailed rant about this here

 http://bugzilla.gnome.org/show_bug.cgi?id=531609#c9
Comment 73 Stephan Kulow 2008-06-02 09:40:49 UTC
ok, after having another discussion with Marcus and Ludwig, I finally agree  that leaving out this feature for 11.0 is the right thing to do. And for the future, we might reconsider if it's not wiser to patch it out of PolicyKit. 

I would still recommend someone of our security team join the policykit upstream mailing list and discuss future developments there.
Comment 74 Kay Sievers 2008-06-02 12:27:38 UTC
I'm unable to handle this any longer. I assigned package maintainership to Ludwig now. Please handle all further updates/issues/discussions/bugs/feature requests, I'm not available for this topic anymore.
Comment 75 David Zeuthen 2008-06-05 22:35:57 UTC
(In reply to comment #73 from Stephan Kulow)
> I would still recommend someone of our security team join the policykit
> upstream mailing list and discuss future developments there.

That would be nice.

> ok, after having another discussion with Marcus and Ludwig, I finally agree 
> that leaving out this feature for 11.0 is the right thing to do. And for the
> future, we might reconsider if it's not wiser to patch it out of PolicyKit. 

As upstream for PolicyKit, this is unacceptable. I jumped into your downstream bugzilla to help clear the confusion. I spent a lot of time explaining to you guys how this works in comment 71. You could at the very least explain why you are crippling upstream sources. Don't expect me to care about SUSE PolicyKit bugs in the future if this continues.
Comment 76 Stephan Kulow 2008-06-06 06:10:00 UTC
David, thanks for your comments. We're not crippling the sources, we're just not setting it setuid for 11.0 as we don't need the feature.

I only wanted to say that for the future we're reconsidering all our options.
Comment 77 Kay Sievers 2008-06-06 07:05:53 UTC
Sure, do we need it. I can not mount my fixed disk partitions, and maybe other things that are not part of the default install. That you don't need that, does in no way say others don't need it. PolicyKit is generic infrastructure, and you decided to ship a willfully broken version, for absolutely not valid reason. It's the equivalent of removing random functions from a shared library, because your system seems to run without them. Nice job!
Comment 78 Stephan Kulow 2008-06-06 07:13:41 UTC
Not _exactly_ - you can't readd the random functions, while a permissions.local entry is done in a second.

And yes, we remove all kind of things our system does not need while it's provided upstream. E.g. GBs of localization and documentation. That's basically the job of a distribution from my point of view.
Comment 79 Kay Sievers 2008-06-06 07:43:00 UTC
So how many bytes did you save here? The job of a distribution is to provide a working system and working infrastructure for people to build stuff on top. You decided that openSUSE does want to do both of them. Really, what's needed to get a clue?
Comment 80 Bernhard Wiedemann 2011-10-31 21:00:10 UTC
This is an autogenerated message for OBS integration:
This bug (295341) was mentioned in
https://build.opensuse.org/request/show/89843 Tumbleweed / permissions