2006 05 Password Tricks Customizing the Password Popup Window


Customizing the password popup window
Password Tricks
We'll show you some tricks for configuring the root password popup window on Red Hat-based systems.
By Armijn Hemel
If you use Red Hat Enterprise Linux or a Red Hat derivative such as Fedora Core or CentOS, you are
probably familiar with the popup window that asks you for the root password before you can launch a
program that should run as root (Figure 1).
Figure 1: Red Hat users are familiar with the popup that asks for the root password.
Most programs that use this authentication mechanism are tools that need extra privileges on the system. An
example of this kind of tool is a program that requires access to a raw network device or a program that needs
write access to directories with configuration information.
What you may not know is that the whole mechanism behind this popup is completely customizable. In this
article, I'll show you how this mechanism works, and I'll also show you how you can change the default
behavior.
consolehelper and userhelper
The two packages that make this possible are called usermode and usermode-gtk. The usermode package
contains two tools that are important: consolehelper and userhelper. The usermode-gtk package contains the
familiar graphical popup window and a few other tools.
Password Tricks 1
consolehelper and userhelper work together to let a non-root user execute a program that runs as root.
Consider, for instance, the network sniffer Ethereal. Ethereal requires root privileges because it needs to set
the network device to promiscuous mode.
On a default install, the menu is configured so that if you select Ethereal, the program /usr/bin/ethereal is
launched. This program is just a symbolic link to consolehelper:
$ ls -l /usr/bin/ethereal
lrwxrwxrwx 1 root root 13 aug 11 20:01 /usr/bin/ethereal -> consolehelper
When consolehelper is executed, it starts userhelper. The permissions of userhelper are set to SUID root, so it
runs as root when it is invoked. If a program is SUID (commonly referred to as "setuid"), when the program is
started, it will run with all the privileges of the owner of the program. Since userhelper is owned by root and
SUID, it will execute with full root privileges. When consolehelper starts userhelper, it passes the name of the
program it needs to run (in our example, Ethereal) to userhelper, which then tries to authenticate the user. If
authentication succeeds, userhelper (running as root) will start the program as root.
The userhelper program first checks a configuration file to determine which program really should be run; it
then looks at a number of other configuration options. userhelper then invokes the Pluggable Authentication
Modules system (PAM) to see if the user is allowed to use the service. If the service is allowed, the real
program is launched. If the user has failed to authenticate correctly, an error message is displayed (Figure 2).
Figure 2: The user fails to authenticate correctly.
You'll find configuration files for userhelper in /etc/security/console.apps/. The configuration for Ethereal
looks like:
USER=root
PROGRAM=/usr/sbin/ethereal
SESSION=true
FALLBACK=true
In this example, the program will ask for the password of user root. If the authentication via PAM is
successful, the program located in /usr/sbin/ethereal will be executed. The variable SESSION indicates
whether or not to use session management in PAM.
For graphical applications, such as Ethereal, session management is needed. The FALLBACK variable is used
to determine if the program should still be run even if authentication fails. The program will, of course, be run
without all privileges and not everything will work. In the case of Ethereal, it can still read network dumps,
but it will not be able to make any new ones.
Another part of the configuration is done via PAM. These settings, which can be found in /etc/pam.d/, follow
the PAM standards.
This approach has one weakness: if the directory that contains the "real" program (in this case /usr/sbin) is
earlier in the $PATH than the directory where consolehelper is located (by default, /usr/bin), consolehelper
will not be invoked first and the program will either not run, or it will not run with the right permissions. You
should keep this in mind if you decide to rearrange the order in which directories in the $PATH are searched.
Password Tricks 2
Simple Adaptations
I personally have always felt it was a bit dangerous when credentials are cached. You have probably seen the
little keyring icon in one of your menu bars after giving the root password through the usermode mechanism
(see Figure 3). If this keyring is visible, you can execute programs that would otherwise require you to give
the root password via usermode.
Figure 3: If the system has credentials for the user, the keyring will be visible in the panel.
Many programs have this rule in their PAM configuration file by default:
session optional pam_timestamp.so
This setting means that PAM will keep a timestamp. When a program has this rule in its PAM configuration
file, the program will first check if there has already been a valid, cached, authentication:
auth sufficient pam_timestamp.so
Commenting out the rules mentioned above will prevent the user's credentials from being cached after a
successful authentication and will prevent authorization using cached credentials.
Advanced Usage
Say you want to lock down which users can execute certain programs. There are several ways you can achieve
this. The first way is through the configuration of consolehelper itself; the other, and more powerful way, is
through PAM.
If you are configuring through consolehelper, you can prevent users from having to know the root password
by having them authenticate using their own passwords. Just change the line in the userhelper configuration in
/etc/security/console.apps/ from authenticating as root to the following:
USER=
If you do this, you will be asked for your own password. If you enter your password successfully, the program
will start. Keep in mind that the fact that you use your own password doesn't change anything with regard to
the program's privileges. The program that is started is still run as root, so be sure you use this feature
carefully.
If you set USER to the special variable , no access will be allowed:
USER=
If you try to launch Ethereal now, you will get an error and the program will not start (Figure 4). You will
probably wonder why this feature is useful. One of the other configuration parameters is UGROUPS. This
parameter can be assigned a comma-separated list of groups. Members of these groups will be authenticated
as if their names were given in the configuration file (USER=). That is, they will be authenticated with
their own passwords. If the configuration has USER=root set, all other users will have to give the
root password. If you use both USER= and UGROUPS in the configuration, you can give members of
certain groups the ability to run programs without them having to know the root password. This way you can
create sudo-like behavior.
Password Tricks 3
Figure 4: The user doesn't have enough permissions to launch the program.
Customization using PAM
PAM offers a great variety of modules, including options for authenticating against a database or hardware
token, and even tools for voice recognition. In this article I will only give a few small ready-to-work examples
of how you can play with PAM inside consolehelper.
On certain machines on my network, I only want certain users to be able to sniff network traffic. For this
purpose, PAM has a module called pam_localuser. It normally checks in /etc/passwd if a certain account is
listed, but it can also be configured to use a separate file. I keep the users I want to give permission in a file
called /etc/localusers, which I make only readable and writable for root. In this file, I only have two users.
The file is in the same format as /etc/passwd:
root:x:0:0::
armijn:x:500:500::
In the PAM configuration, I add the following rule:
account required pam_localuser.so file=/etc/localusers
Now when Ethereal is started via usermode, it also checks whether or not the user is in /etc/localusers. Before
this can work cleanly, one change is needed: the user that consolehelper authenticates should be changed from
root to the actual user. If not, the system will check if root is in /etc/localusers instead of checking for the real
user! The configuration for Ethereal should be changed to:
USER=
PROGRAM=/usr/sbin/ethereal
SESSION=true
FALLBACK=true
If I remove the user armijn from this file, I can't launch Ethereal with full privileges anymore, except as root.
With the localuser PAM module, you can have separate files with permissions for each program.
Other uses for this particular module are the poweroff, halt, and reboot commands. On Red Hat Linux (and
derivates) these tools are also controlled by usermode. By adding a file where you list authorized users, you
can control which users have which rights - for example, you can control which users have the right to power
off the machine. These three commands also use another interesting PAM module titled pam_console, which
checks if the user is currently logged in at the local console.
Two of the rules in the PAM configuration for these commands are:
auth sufficient pam_rootok.so
auth required pam_console.so
These rules mean that only root and the user who is logged in at the console can power off, halt, or reboot.
Users who are just logged in remotely, except root, are not allowed to turn off or reboot the machine. By
removing the second rule, the user currently logged in at the console can't perform these actions anymore,
except if that user happens to be root. Of course, you can still power off the system using GDM.
Password Tricks 4
Wise words
The techniques described in this article are useful in some environments, but in other cases, they may be
totally unnecessary. Before you start rebuilding your whole system to use usermode, you should keep in mind
that the tools that make use of usermode all have one characteristic in common: they need to access files that
normally cannot be accessed or modified by mere mortal users.
Often there is no reason at all to change the default security system. Before you decide to deploy usermode to
restrict access to programs, you should check to see if this option is really worth the effort, and make sure you
aren't just needlessly complicating your security configuration.
More information
If you're looking for more information, you could start with the manpages for consolehelper and userhelper.
The userhelper manpage is especially useful. There are a lot of resources for help with PAM. Start with the
Linux-PAM webpage, which you will find at http://www.kernel.org/pub/linux/libs/pam/. Another good
resource on PAM is Essential System Administration, 3rd edition, by AEleen Frisch, which is published by
O'Reilly.
Password Tricks 5


Wyszukiwarka

Podobne podstrony:
GWT Working with the Google Web Toolkit (2006 05 31)
How to Crack any Password (www windows tips44 blogspot com)
2001 10 Customizing the Desktop Wit Hthe Control Center
2006 05 R odp
2006 05 Lazarus i pudełko z hasłami [Programowanie]
Święty Pustelnik z Libanu (o ojcu Charbel) Miłujcie się 2006 05
Suits [1x06] Tricks of the Trade
2006 05 Antywzorce w zarządzaniu projektami informatycznymi [Inzynieria Oprogramowania]
ldap customizing the adldap module
2006 05 R
Magic Tricks for the Beginning Magician
2006 05?sktop Disco
2006 08 Kernel Business Rebuilding the Kernel for Non Experts

więcej podobnych podstron