-
Notifications
You must be signed in to change notification settings - Fork 142
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Too strict Polkit auth_self_keep
authorization requirement?
#544
Comments
Hi @mgerstner my work in pull request #531 was meant to preserve the existing threat model. We'll need someone else to shed light on the original threat model and its intentions. Is this about all read-only methods/actions or about a particular one? |
Hi, it is about all occurences of We are currently integrating the D-Bus bridge into the openSUSE packaging of usbguard and a colleague complained about these |
@mgerstner I understand. @radosroka what do you think? |
Well security/hardening is always against usability. It's up to you/admin how to find a balance between these two. I personally don't have a problem with writing a password even for read-ops. If you feel like the benefits of password less operation will overweight the security concerns then you can use it as you wish. |
We will naturally do so. I just wanted to make sure there is not some special consideration behind this that I don't know of, since |
The auth_self_keep setting is unusual and not user friendly, offering little benefits security wise. Upstream does not seem to have a special reason for this: USBGuard/usbguard#544 (comment) So let's relax these settings to 'yes' instead.
yeah, this is probably becoming problematic for GNOME users, too. Can we get to a point where the currently active user can list the policy and authorise (or deny) devices?
I'd like to disagree somewhat. Our goal should be to unify security and usability. To the point that users don't even notice how the protection mechanism unfolds its powers. A thing that's most secure but cannot be used by anybody doesn't increase the overall protection. In that sense, requiring all downstreams to patch the defaults in order for the thing to be actually useful, is a waste of energy. I feel reminded of another discussion that also balanced usability and security: #246 (comment) |
@radosroka would you accept a pull request replacing @mgerstner is this about all three of them^^ or which ones? |
Yes all three of them. |
Yes, no problem. |
Please see PR #545 |
In the Polkit policy the read-only operations are guarded by
auth_self_keep
authorization requirements.Is this adding any security / was this a conscious decision or would it be also okay to grant
yes
for locally logged in sessions?The text was updated successfully, but these errors were encountered: