73 lines
3.3 KiB
Plaintext
73 lines
3.3 KiB
Plaintext
Red Hat Security Enhancements for tog-pegasus
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
Access to the Pegasus services:
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
By default, with the configuration as shipped, the upstream Open Group Pegasus
|
|
release allowed any user with an account on the machine (including root) to
|
|
use the network HTTPS port 5989 (by default) and HTTP port 5988 services.
|
|
On authentication failures, though there was the standard PAM authentication
|
|
failure delay, no messages were logged to syslog. This meant that potentially
|
|
a long-running cracker process could try millions of root passwords over the
|
|
network and could possibly discover the root password . If users were unwise
|
|
enough to enable the HTTP service on port 5988, then root passwords could be
|
|
sent unencrypted over the network.
|
|
|
|
This situation was deemed unacceptable by Red Hat RHEL QA test and Security
|
|
Response team engineers.
|
|
|
|
So for the Red Hat tog-pegasus release, PAM access control was enabled, to
|
|
remove these vulnerabilities. There is now a "pegasus" user created during
|
|
install, and users are recommended to use only that user to invoke CIM
|
|
operations over the network.
|
|
|
|
By default:
|
|
|
|
o root password authentication for CIM operations invoked over the network
|
|
HTTPS/HTTP services is denied - the root user is unable to invoke pegasus
|
|
services over the network - only the "pegasus" user may do so.
|
|
|
|
o the root user may invoke CIM operations over the HTTPS/HTTP ports on the
|
|
local machine.
|
|
|
|
o any user other than "pegasus" or "root" may not invoke pegasus services
|
|
over the HTTPS/HTTP ports at all.
|
|
|
|
o any PAM authentication failure will be logged to syslog
|
|
|
|
NOTE: after installation, you must set the password for the pegasus user -
|
|
issue this command as root :
|
|
# passwd pegasus
|
|
- to enable CIM operation network service, if the pegasus user is
|
|
a local system user.
|
|
|
|
Note also that even though a non-root user's password is used to authenticate
|
|
with the cimserver, the cimserver and all CIM Operation Providers run as root.
|
|
This was another reason to restrict use of CIM Operations to only one user.
|
|
|
|
The "pegasus" user may of course be a NIS, Kerberos, or LDAP user, which
|
|
could be used as configured in /etc/nsswitch.conf or with the PAM stack.
|
|
|
|
You may configure this differently, and at your own risk, by modifying the
|
|
pam_access configuration file /etc/Pegasus/access.conf, or by removing the
|
|
line:
|
|
account required pam_access.so accessfile=/etc/Pegasus/access.conf
|
|
from /etc/pam.d/wbem - then tog-pegasus' authentication behaviour would
|
|
be the same as that of the upstream release.
|
|
|
|
SELinux
|
|
~~~~~~~
|
|
There is an SELinux policy for tog-pegasus shipped in selinux-policy-targeted-1.17.30-2.110+ .
|
|
When SELinux is enabled in enforcing mode, the cimserver and providers are restricted to the
|
|
operations allowed to the 'pegasus_t' security context. Also only the pegasus_exec_t context
|
|
may modify the repository, and only the pegasus_exec_conf_t context may modify the pegasus
|
|
configuration files which are of pegasus_conf_t file context.
|
|
|
|
|
|
ExecShield
|
|
~~~~~~~~~~
|
|
All tog-pegasus binary executables are compiled with ExecShield enabled, which make it nearly
|
|
impossible to modify them or to poke executable code into them.
|
|
|