Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 138707 - Change the group ownership on su to wheel
Summary: Change the group ownership on su to wheel
Status: RESOLVED WONTFIX
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Default Configs (show other bugs)
Hardware: All Linux
: High normal
Assignee: Gentoo Security
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2006-07-01 07:02 UTC by David Gurvich
Modified: 2006-07-02 12:24 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description David Gurvich 2006-07-01 07:02:53 UTC
The current permissions and ownership on su allow any user to su to root, and are 
-rws--x--x 1 root root
The BSDs do not have that security gap, with su acting much like sudo and requiring that the user be in the wheel group to use su.  If the group that su belongs to were change to 'wheel' from 'root' that would have a similar effect on Gentoo.
Comment 1 Stefan Cornelius (RETIRED) gentoo-dev 2006-07-01 07:17:06 UTC
mhhhh, base-system and security, how do we think about this?
Comment 2 Sascha Silbe 2006-07-02 00:46:27 UTC
I'm not a Gentoo developer, but it's already possible to configure su the way the reporter wants and AFAIR it's even the default (I do NOT want this behaviour, so it's commented out on my system):

=== Begin /etc/pam.d/su ===
[...]
# Comment this to allow any user, even those not in the 'wheel'
# group to su
# auth       required     /lib/security/pam_wheel.so use_uid
[...]
=== End /etc/pam.d/su ===
 
Comment 3 Ahmed Abdalla 2006-07-02 10:45:33 UTC
I'm not a dev, however pam is used as the athenticating agent, so even though the group ownership is root:root, only users in the wheel group can authenticate by default.  Control of who can authenticate can be changed by altering the pam configuration for su, and iirc, if you change the ownership, it could break pam being able to handle this.

Ahmed (taz)
Comment 4 SpanKY gentoo-dev 2006-07-02 12:24:58 UTC
this is already handled inside of su itself:
#
# If "yes", the user must be listed as a member of the first gid 0 group
# in /etc/group (called "root" on most Linux systems) to be able to "su"
# to uid 0 accounts.  If the group doesn't exist or is empty, no one
# will be able to "su" to uid 0.
# 
SU_WHEEL_ONLY   yes