Merge pull request #308 from martijndegouw/relaxgidcheck
newuidmap,newgidmap: Relax gid checking to allow running under alternative group ID
This commit is contained in:
		@@ -438,3 +438,9 @@ USERGROUPS_ENAB yes
 | 
			
		||||
# missing.
 | 
			
		||||
#
 | 
			
		||||
#FORCE_SHADOW    yes
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Allow newuidmap and newgidmap when running under an alternative
 | 
			
		||||
# primary group.
 | 
			
		||||
#
 | 
			
		||||
#GRANT_AUX_GROUP_SUBIDS yes
 | 
			
		||||
 
 | 
			
		||||
@@ -160,6 +160,7 @@ static struct itemdef def_table[] = {
 | 
			
		||||
	{"USE_TCB", NULL},
 | 
			
		||||
#endif
 | 
			
		||||
	{"FORCE_SHADOW", NULL},
 | 
			
		||||
	{"GRANT_AUX_GROUP_SUBIDS", NULL},
 | 
			
		||||
	{NULL, NULL}
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -39,6 +39,7 @@
 | 
			
		||||
#include "defines.h"
 | 
			
		||||
#include "prototypes.h"
 | 
			
		||||
#include "subordinateio.h"
 | 
			
		||||
#include "getdef.h"
 | 
			
		||||
#include "idmapping.h"
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
@@ -60,7 +61,7 @@ static bool verify_range(struct passwd *pw, struct map_range *range, bool *allow
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/* Allow a process to map its own gid. */
 | 
			
		||||
	if ((range->count == 1) && (pw->pw_gid == range->lower)) {
 | 
			
		||||
	if ((range->count == 1) && (getgid() == range->lower)) {
 | 
			
		||||
		/* noop -- if setgroups is enabled already we won't disable it. */
 | 
			
		||||
		return true;
 | 
			
		||||
	}
 | 
			
		||||
@@ -228,9 +229,9 @@ int main(int argc, char **argv)
 | 
			
		||||
	 * mappings we have been asked to set.
 | 
			
		||||
	 */
 | 
			
		||||
	if ((getuid() != pw->pw_uid) ||
 | 
			
		||||
	    (getgid() != pw->pw_gid) ||
 | 
			
		||||
	    (!getdef_bool("GRANT_AUX_GROUP_SUBIDS") && (getgid() != pw->pw_gid)) ||
 | 
			
		||||
	    (pw->pw_uid != st.st_uid) ||
 | 
			
		||||
	    (pw->pw_gid != st.st_gid)) {
 | 
			
		||||
	    (getgid() != st.st_gid)) {
 | 
			
		||||
		fprintf(stderr, _( "%s: Target %u is owned by a different user: uid:%lu pw_uid:%lu st_uid:%lu, gid:%lu pw_gid:%lu st_gid:%lu\n" ),
 | 
			
		||||
			Prog, target,
 | 
			
		||||
			(unsigned long int)getuid(), (unsigned long int)pw->pw_uid, (unsigned long int)st.st_uid,
 | 
			
		||||
 
 | 
			
		||||
@@ -39,6 +39,7 @@
 | 
			
		||||
#include "defines.h"
 | 
			
		||||
#include "prototypes.h"
 | 
			
		||||
#include "subordinateio.h"
 | 
			
		||||
#include "getdef.h"
 | 
			
		||||
#include "idmapping.h"
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
@@ -158,9 +159,9 @@ int main(int argc, char **argv)
 | 
			
		||||
	 * mappings we have been asked to set.
 | 
			
		||||
	 */
 | 
			
		||||
	if ((getuid() != pw->pw_uid) ||
 | 
			
		||||
	    (getgid() != pw->pw_gid) ||
 | 
			
		||||
	    (!getdef_bool("GRANT_AUX_GROUP_SUBIDS") && (getgid() != pw->pw_gid)) ||
 | 
			
		||||
	    (pw->pw_uid != st.st_uid) ||
 | 
			
		||||
	    (pw->pw_gid != st.st_gid)) {
 | 
			
		||||
	    (getgid() != st.st_gid)) {
 | 
			
		||||
		fprintf(stderr, _( "%s: Target process %u is owned by a different user: uid:%lu pw_uid:%lu st_uid:%lu, gid:%lu pw_gid:%lu st_gid:%lu\n" ),
 | 
			
		||||
			Prog, target,
 | 
			
		||||
			(unsigned long int)getuid(), (unsigned long int)pw->pw_uid, (unsigned long int)st.st_uid,
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										0
									
								
								tests/newgidmap/01_newgidmap/config.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										0
									
								
								tests/newgidmap/01_newgidmap/config.txt
									
									
									
									
									
										Normal file
									
								
							
							
								
								
									
										43
									
								
								tests/newgidmap/01_newgidmap/config/etc/group
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										43
									
								
								tests/newgidmap/01_newgidmap/config/etc/group
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,43 @@
 | 
			
		||||
root:x:0:
 | 
			
		||||
daemon:x:1:
 | 
			
		||||
bin:x:2:
 | 
			
		||||
sys:x:3:root
 | 
			
		||||
adm:x:4:root,foo
 | 
			
		||||
tty:x:5:
 | 
			
		||||
disk:x:6:
 | 
			
		||||
lp:x:7:foo,root
 | 
			
		||||
mail:x:8:
 | 
			
		||||
news:x:9:
 | 
			
		||||
uucp:x:10:
 | 
			
		||||
man:x:12:
 | 
			
		||||
proxy:x:13:
 | 
			
		||||
kmem:x:15:
 | 
			
		||||
dialout:x:20:
 | 
			
		||||
fax:x:21:foo
 | 
			
		||||
voice:x:22:
 | 
			
		||||
cdrom:x:24:
 | 
			
		||||
floppy:x:25:foo
 | 
			
		||||
tape:x:26:
 | 
			
		||||
sudo:x:27:
 | 
			
		||||
audio:x:29:
 | 
			
		||||
dip:x:30:
 | 
			
		||||
www-data:x:33:
 | 
			
		||||
backup:x:34:
 | 
			
		||||
operator:x:37:
 | 
			
		||||
list:x:38:
 | 
			
		||||
irc:x:39:
 | 
			
		||||
src:x:40:
 | 
			
		||||
gnats:x:41:
 | 
			
		||||
shadow:x:42:
 | 
			
		||||
utmp:x:43:
 | 
			
		||||
video:x:44:
 | 
			
		||||
sasl:x:45:
 | 
			
		||||
plugdev:x:46:
 | 
			
		||||
staff:x:50:
 | 
			
		||||
games:x:60:
 | 
			
		||||
users:x:100:foo
 | 
			
		||||
nogroup:x:65534:
 | 
			
		||||
crontab:x:101:
 | 
			
		||||
Debian-exim:x:102:
 | 
			
		||||
foo:x:1000:
 | 
			
		||||
bar:x:1001:foo
 | 
			
		||||
							
								
								
									
										342
									
								
								tests/newgidmap/01_newgidmap/config/etc/login.defs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										342
									
								
								tests/newgidmap/01_newgidmap/config/etc/login.defs
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,342 @@
 | 
			
		||||
#
 | 
			
		||||
# /etc/login.defs - Configuration control definitions for the login package.
 | 
			
		||||
#
 | 
			
		||||
# Three items must be defined:  MAIL_DIR, ENV_SUPATH, and ENV_PATH.
 | 
			
		||||
# If unspecified, some arbitrary (and possibly incorrect) value will
 | 
			
		||||
# be assumed.  All other items are optional - if not specified then
 | 
			
		||||
# the described action or option will be inhibited.
 | 
			
		||||
#
 | 
			
		||||
# Comment lines (lines beginning with "#") and blank lines are ignored.
 | 
			
		||||
#
 | 
			
		||||
# Modified for Linux.  --marekm
 | 
			
		||||
 | 
			
		||||
# REQUIRED for useradd/userdel/usermod
 | 
			
		||||
#   Directory where mailboxes reside, _or_ name of file, relative to the
 | 
			
		||||
#   home directory.  If you _do_ define MAIL_DIR and MAIL_FILE,
 | 
			
		||||
#   MAIL_DIR takes precedence.
 | 
			
		||||
#
 | 
			
		||||
#   Essentially:
 | 
			
		||||
#      - MAIL_DIR defines the location of users mail spool files
 | 
			
		||||
#        (for mbox use) by appending the username to MAIL_DIR as defined
 | 
			
		||||
#        below.
 | 
			
		||||
#      - MAIL_FILE defines the location of the users mail spool files as the
 | 
			
		||||
#        fully-qualified filename obtained by prepending the user home
 | 
			
		||||
#        directory before $MAIL_FILE
 | 
			
		||||
#
 | 
			
		||||
# NOTE: This is no more used for setting up users MAIL environment variable
 | 
			
		||||
#       which is, starting from shadow 4.0.12-1 in Debian, entirely the
 | 
			
		||||
#       job of the pam_mail PAM modules
 | 
			
		||||
#       See default PAM configuration files provided for
 | 
			
		||||
#       login, su, etc.
 | 
			
		||||
#
 | 
			
		||||
# This is a temporary situation: setting these variables will soon
 | 
			
		||||
# move to /etc/default/useradd and the variables will then be
 | 
			
		||||
# no more supported
 | 
			
		||||
MAIL_DIR        /var/mail
 | 
			
		||||
#MAIL_FILE      .mail
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Enable logging and display of /var/log/faillog login failure info.
 | 
			
		||||
# This option conflicts with the pam_tally PAM module.
 | 
			
		||||
#
 | 
			
		||||
FAILLOG_ENAB		yes
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Enable display of unknown usernames when login failures are recorded.
 | 
			
		||||
#
 | 
			
		||||
# WARNING: Unknown usernames may become world readable. 
 | 
			
		||||
# See #290803 and #298773 for details about how this could become a security
 | 
			
		||||
# concern
 | 
			
		||||
LOG_UNKFAIL_ENAB	no
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Enable logging of successful logins
 | 
			
		||||
#
 | 
			
		||||
LOG_OK_LOGINS		no
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Enable "syslog" logging of su activity - in addition to sulog file logging.
 | 
			
		||||
# SYSLOG_SG_ENAB does the same for newgrp and sg.
 | 
			
		||||
#
 | 
			
		||||
SYSLOG_SU_ENAB		yes
 | 
			
		||||
SYSLOG_SG_ENAB		yes
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, all su activity is logged to this file.
 | 
			
		||||
#
 | 
			
		||||
#SULOG_FILE	/var/log/sulog
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, file which maps tty line to TERM environment parameter.
 | 
			
		||||
# Each line of the file is in a format something like "vt100  tty01".
 | 
			
		||||
#
 | 
			
		||||
#TTYTYPE_FILE	/etc/ttytype
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, login failures will be logged here in a utmp format
 | 
			
		||||
# last, when invoked as lastb, will read /var/log/btmp, so...
 | 
			
		||||
#
 | 
			
		||||
FTMP_FILE	/var/log/btmp
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, the command name to display when running "su -".  For
 | 
			
		||||
# example, if this is defined as "su" then a "ps" will display the
 | 
			
		||||
# command is "-su".  If not defined, then "ps" would display the
 | 
			
		||||
# name of the shell actually being run, e.g. something like "-sh".
 | 
			
		||||
#
 | 
			
		||||
SU_NAME		su
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, file which inhibits all the usual chatter during the login
 | 
			
		||||
# sequence.  If a full pathname, then hushed mode will be enabled if the
 | 
			
		||||
# user's name or shell are found in the file.  If not a full pathname, then
 | 
			
		||||
# hushed mode will be enabled if the file exists in the user's home directory.
 | 
			
		||||
#
 | 
			
		||||
HUSHLOGIN_FILE	.hushlogin
 | 
			
		||||
#HUSHLOGIN_FILE	/etc/hushlogins
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# *REQUIRED*  The default PATH settings, for superuser and normal users.
 | 
			
		||||
#
 | 
			
		||||
# (they are minimal, add the rest in the shell startup files)
 | 
			
		||||
ENV_SUPATH	PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
 | 
			
		||||
ENV_PATH	PATH=/usr/local/bin:/usr/bin:/bin:/usr/local/games:/usr/games
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Terminal permissions
 | 
			
		||||
#
 | 
			
		||||
#	TTYGROUP	Login tty will be assigned this group ownership.
 | 
			
		||||
#	TTYPERM		Login tty will be set to this permission.
 | 
			
		||||
#
 | 
			
		||||
# If you have a "write" program which is "setgid" to a special group
 | 
			
		||||
# which owns the terminals, define TTYGROUP to the group number and
 | 
			
		||||
# TTYPERM to 0620.  Otherwise leave TTYGROUP commented out and assign
 | 
			
		||||
# TTYPERM to either 622 or 600.
 | 
			
		||||
#
 | 
			
		||||
# In Debian /usr/bin/bsd-write or similar programs are setgid tty
 | 
			
		||||
# However, the default and recommended value for TTYPERM is still 0600
 | 
			
		||||
# to not allow anyone to write to anyone else console or terminal
 | 
			
		||||
 | 
			
		||||
# Users can still allow other people to write them by issuing 
 | 
			
		||||
# the "mesg y" command.
 | 
			
		||||
 | 
			
		||||
TTYGROUP	tty
 | 
			
		||||
TTYPERM		0600
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Login configuration initializations:
 | 
			
		||||
#
 | 
			
		||||
#	ERASECHAR	Terminal ERASE character ('\010' = backspace).
 | 
			
		||||
#	KILLCHAR	Terminal KILL character ('\025' = CTRL/U).
 | 
			
		||||
#	UMASK		Default "umask" value.
 | 
			
		||||
#
 | 
			
		||||
# The ERASECHAR and KILLCHAR are used only on System V machines.
 | 
			
		||||
# 
 | 
			
		||||
# UMASK is the default umask value for pam_umask and is used by
 | 
			
		||||
# useradd and newusers to set the mode of the new home directories.
 | 
			
		||||
# 022 is the "historical" value in Debian for UMASK
 | 
			
		||||
# 027, or even 077, could be considered better for privacy
 | 
			
		||||
# There is no One True Answer here : each sysadmin must make up his/her
 | 
			
		||||
# mind.
 | 
			
		||||
#
 | 
			
		||||
# If USERGROUPS_ENAB is set to "yes", that will modify this UMASK default value
 | 
			
		||||
# for private user groups, i. e. the uid is the same as gid, and username is
 | 
			
		||||
# the same as the primary group name: for these, the user permissions will be
 | 
			
		||||
# used as group permissions, e. g. 022 will become 002.
 | 
			
		||||
#
 | 
			
		||||
# Prefix these values with "0" to get octal, "0x" to get hexadecimal.
 | 
			
		||||
#
 | 
			
		||||
ERASECHAR	0177
 | 
			
		||||
KILLCHAR	025
 | 
			
		||||
UMASK		022
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Password aging controls:
 | 
			
		||||
#
 | 
			
		||||
#	PASS_MAX_DAYS	Maximum number of days a password may be used.
 | 
			
		||||
#	PASS_MIN_DAYS	Minimum number of days allowed between password changes.
 | 
			
		||||
#	PASS_WARN_AGE	Number of days warning given before a password expires.
 | 
			
		||||
#
 | 
			
		||||
PASS_MAX_DAYS	99999
 | 
			
		||||
PASS_MIN_DAYS	0
 | 
			
		||||
PASS_WARN_AGE	7
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Min/max values for automatic uid selection in useradd
 | 
			
		||||
#
 | 
			
		||||
UID_MIN			 1000
 | 
			
		||||
UID_MAX			60000
 | 
			
		||||
# System accounts
 | 
			
		||||
#SYS_UID_MIN		  100
 | 
			
		||||
#SYS_UID_MAX		  999
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Min/max values for automatic gid selection in groupadd
 | 
			
		||||
#
 | 
			
		||||
GID_MIN			 1000
 | 
			
		||||
GID_MAX			60000
 | 
			
		||||
# System accounts
 | 
			
		||||
#SYS_GID_MIN		  100
 | 
			
		||||
#SYS_GID_MAX		  999
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Max number of login retries if password is bad. This will most likely be
 | 
			
		||||
# overriden by PAM, since the default pam_unix module has it's own built
 | 
			
		||||
# in of 3 retries. However, this is a safe fallback in case you are using
 | 
			
		||||
# an authentication module that does not enforce PAM_MAXTRIES.
 | 
			
		||||
#
 | 
			
		||||
LOGIN_RETRIES		5
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Max time in seconds for login
 | 
			
		||||
#
 | 
			
		||||
LOGIN_TIMEOUT		60
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Which fields may be changed by regular users using chfn - use
 | 
			
		||||
# any combination of letters "frwh" (full name, room number, work
 | 
			
		||||
# phone, home phone).  If not defined, no changes are allowed.
 | 
			
		||||
# For backward compatibility, "yes" = "rwh" and "no" = "frwh".
 | 
			
		||||
# 
 | 
			
		||||
CHFN_RESTRICT		rwh
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Should login be allowed if we can't cd to the home directory?
 | 
			
		||||
# Default in no.
 | 
			
		||||
#
 | 
			
		||||
DEFAULT_HOME	yes
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, this command is run when removing a user.
 | 
			
		||||
# It should remove any at/cron/print jobs etc. owned by
 | 
			
		||||
# the user to be removed (passed as the first argument).
 | 
			
		||||
#
 | 
			
		||||
#USERDEL_CMD	/usr/sbin/userdel_local
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If set to yes, userdel will remove the user's group if it contains no
 | 
			
		||||
# more members, and useradd will create by default a group with the name
 | 
			
		||||
# of the user.
 | 
			
		||||
#
 | 
			
		||||
# Other former uses of this variable such as setting the umask when
 | 
			
		||||
# user==primary group are not used in PAM environments, such as Debian
 | 
			
		||||
#
 | 
			
		||||
USERGROUPS_ENAB yes
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Instead of the real user shell, the program specified by this parameter
 | 
			
		||||
# will be launched, although its visible name (argv[0]) will be the shell's.
 | 
			
		||||
# The program may do whatever it wants (logging, additional authentification,
 | 
			
		||||
# banner, ...) before running the actual shell.
 | 
			
		||||
#
 | 
			
		||||
# FAKE_SHELL /bin/fakeshell
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, either full pathname of a file containing device names or
 | 
			
		||||
# a ":" delimited list of device names.  Root logins will be allowed only
 | 
			
		||||
# upon these devices.
 | 
			
		||||
#
 | 
			
		||||
# This variable is used by login and su.
 | 
			
		||||
#
 | 
			
		||||
#CONSOLE	/etc/consoles
 | 
			
		||||
#CONSOLE	console:tty01:tty02:tty03:tty04
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# List of groups to add to the user's supplementary group set
 | 
			
		||||
# when logging in on the console (as determined by the CONSOLE
 | 
			
		||||
# setting).  Default is none.
 | 
			
		||||
#
 | 
			
		||||
# Use with caution - it is possible for users to gain permanent
 | 
			
		||||
# access to these groups, even when not logged in on the console.
 | 
			
		||||
# How to do it is left as an exercise for the reader...
 | 
			
		||||
#
 | 
			
		||||
# This variable is used by login and su.
 | 
			
		||||
#
 | 
			
		||||
#CONSOLE_GROUPS		floppy:audio:cdrom
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If set to "yes", new passwords will be encrypted using the MD5-based
 | 
			
		||||
# algorithm compatible with the one used by recent releases of FreeBSD.
 | 
			
		||||
# It supports passwords of unlimited length and longer salt strings.
 | 
			
		||||
# Set to "no" if you need to copy encrypted passwords to other systems
 | 
			
		||||
# which don't understand the new algorithm.  Default is "no".
 | 
			
		||||
#
 | 
			
		||||
# This variable is deprecated. You should use ENCRYPT_METHOD.
 | 
			
		||||
#
 | 
			
		||||
#MD5_CRYPT_ENAB	no
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If set to MD5 , MD5-based algorithm will be used for encrypting password
 | 
			
		||||
# If set to SHA256, SHA256-based algorithm will be used for encrypting password
 | 
			
		||||
# If set to SHA512, SHA512-based algorithm will be used for encrypting password
 | 
			
		||||
# If set to DES, DES-based algorithm will be used for encrypting password (default)
 | 
			
		||||
# Overrides the MD5_CRYPT_ENAB option
 | 
			
		||||
#
 | 
			
		||||
# Note: It is recommended to use a value consistent with
 | 
			
		||||
# the PAM modules configuration.
 | 
			
		||||
#
 | 
			
		||||
ENCRYPT_METHOD SHA512
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Only used if ENCRYPT_METHOD is set to SHA256 or SHA512.
 | 
			
		||||
#
 | 
			
		||||
# Define the number of SHA rounds.
 | 
			
		||||
# With a lot of rounds, it is more difficult to brute forcing the password.
 | 
			
		||||
# But note also that it more CPU resources will be needed to authenticate
 | 
			
		||||
# users.
 | 
			
		||||
#
 | 
			
		||||
# If not specified, the libc will choose the default number of rounds (5000).
 | 
			
		||||
# The values must be inside the 1000-999999999 range.
 | 
			
		||||
# If only one of the MIN or MAX values is set, then this value will be used.
 | 
			
		||||
# If MIN > MAX, the highest value will be used.
 | 
			
		||||
#
 | 
			
		||||
# SHA_CRYPT_MIN_ROUNDS 5000
 | 
			
		||||
# SHA_CRYPT_MAX_ROUNDS 5000
 | 
			
		||||
 | 
			
		||||
# GRANT_AUX_GROUP_SUBIDS yes
 | 
			
		||||
 | 
			
		||||
################# OBSOLETED BY PAM ##############
 | 
			
		||||
#						#
 | 
			
		||||
# These options are now handled by PAM. Please	#
 | 
			
		||||
# edit the appropriate file in /etc/pam.d/ to	#
 | 
			
		||||
# enable the equivelants of them.
 | 
			
		||||
#
 | 
			
		||||
###############
 | 
			
		||||
 | 
			
		||||
#MOTD_FILE
 | 
			
		||||
#DIALUPS_CHECK_ENAB
 | 
			
		||||
#LASTLOG_ENAB
 | 
			
		||||
#MAIL_CHECK_ENAB
 | 
			
		||||
#OBSCURE_CHECKS_ENAB
 | 
			
		||||
#PORTTIME_CHECKS_ENAB
 | 
			
		||||
#SU_WHEEL_ONLY
 | 
			
		||||
#CRACKLIB_DICTPATH
 | 
			
		||||
#PASS_CHANGE_TRIES
 | 
			
		||||
#PASS_ALWAYS_WARN
 | 
			
		||||
#ENVIRON_FILE
 | 
			
		||||
#NOLOGINS_FILE
 | 
			
		||||
#ISSUE_FILE
 | 
			
		||||
#PASS_MIN_LEN
 | 
			
		||||
#PASS_MAX_LEN
 | 
			
		||||
#ULIMIT
 | 
			
		||||
#ENV_HZ
 | 
			
		||||
#CHFN_AUTH
 | 
			
		||||
#CHSH_AUTH
 | 
			
		||||
#FAIL_DELAY
 | 
			
		||||
 | 
			
		||||
################# OBSOLETED #######################
 | 
			
		||||
#						  #
 | 
			
		||||
# These options are no more handled by shadow.    #
 | 
			
		||||
#                                                 #
 | 
			
		||||
# Shadow utilities will display a warning if they #
 | 
			
		||||
# still appear.                                   #
 | 
			
		||||
#                                                 #
 | 
			
		||||
###################################################
 | 
			
		||||
 | 
			
		||||
# CLOSE_SESSIONS
 | 
			
		||||
# LOGIN_STRING
 | 
			
		||||
# NO_PASSWORD_CONSOLE
 | 
			
		||||
# QMAIL_DIR
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										20
									
								
								tests/newgidmap/01_newgidmap/config/etc/passwd
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										20
									
								
								tests/newgidmap/01_newgidmap/config/etc/passwd
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,20 @@
 | 
			
		||||
root:x:0:0:root:/root:/bin/bash
 | 
			
		||||
daemon:x:1:1:daemon:/usr/sbin:/bin/sh
 | 
			
		||||
bin:x:2:2:bin:/bin:/bin/sh
 | 
			
		||||
sys:x:3:3:sys:/dev:/bin/sh
 | 
			
		||||
sync:x:4:65534:sync:/bin:/bin/sync
 | 
			
		||||
games:x:5:60:games:/usr/games:/bin/sh
 | 
			
		||||
man:x:6:12:man:/var/cache/man:/bin/sh
 | 
			
		||||
lp:x:7:7:lp:/var/spool/lpd:/bin/sh
 | 
			
		||||
mail:x:8:8:mail:/var/mail:/bin/sh
 | 
			
		||||
news:x:9:9:news:/var/spool/news:/bin/sh
 | 
			
		||||
uucp:x:10:10:uucp:/var/spool/uucp:/bin/sh
 | 
			
		||||
proxy:x:13:13:proxy:/bin:/bin/sh
 | 
			
		||||
www-data:x:33:33:www-data:/var/www:/bin/sh
 | 
			
		||||
backup:x:34:34:backup:/var/backups:/bin/sh
 | 
			
		||||
list:x:38:38:Mailing List Manager:/var/list:/bin/sh
 | 
			
		||||
irc:x:39:39:ircd:/var/run/ircd:/bin/sh
 | 
			
		||||
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/bin/sh
 | 
			
		||||
nobody:x:65534:65534:nobody:/nonexistent:/bin/sh
 | 
			
		||||
Debian-exim:x:102:102::/var/spool/exim4:/bin/false
 | 
			
		||||
foo:x:1000:1000::/home/foo:/bin/sh
 | 
			
		||||
							
								
								
									
										1
									
								
								tests/newgidmap/01_newgidmap/config/etc/subgid
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								tests/newgidmap/01_newgidmap/config/etc/subgid
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1 @@
 | 
			
		||||
foo:1000000:1000
 | 
			
		||||
							
								
								
									
										1
									
								
								tests/newgidmap/01_newgidmap/config/etc/subuid
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								tests/newgidmap/01_newgidmap/config/etc/subuid
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1 @@
 | 
			
		||||
foo:1000000:1000
 | 
			
		||||
							
								
								
									
										2
									
								
								tests/newgidmap/01_newgidmap/data/gid_map
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										2
									
								
								tests/newgidmap/01_newgidmap/data/gid_map
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,2 @@
 | 
			
		||||
         0       1000          1
 | 
			
		||||
         1    1000000       1000
 | 
			
		||||
							
								
								
									
										60
									
								
								tests/newgidmap/01_newgidmap/newgidmap.test
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										60
									
								
								tests/newgidmap/01_newgidmap/newgidmap.test
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,60 @@
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
 | 
			
		||||
set -e
 | 
			
		||||
 | 
			
		||||
cd $(dirname $0)
 | 
			
		||||
 | 
			
		||||
. ../../common/config.sh
 | 
			
		||||
. ../../common/log.sh
 | 
			
		||||
 | 
			
		||||
log_start "$0" "setup gid mapping"
 | 
			
		||||
 | 
			
		||||
save_config
 | 
			
		||||
 | 
			
		||||
unpriv_userns=$( sysctl -n kernel.unprivileged_userns_clone )
 | 
			
		||||
 | 
			
		||||
# restore the system on exit
 | 
			
		||||
trap 'log_status "$0" "FAILURE"; restore_config; \
 | 
			
		||||
	rm -rf /tmp/test-gidmap; \
 | 
			
		||||
        sysctl -q kernel.unprivileged_userns_clone=$unpriv_userns' 0
 | 
			
		||||
 | 
			
		||||
change_config
 | 
			
		||||
 | 
			
		||||
echo -n "Enable unprivileged user namespaces... "
 | 
			
		||||
sysctl -q kernel.unprivileged_userns_clone=1
 | 
			
		||||
echo "OK"
 | 
			
		||||
 | 
			
		||||
echo -n "Create world writable tmp directory... "
 | 
			
		||||
mkdir -m 0777 /tmp/test-gidmap
 | 
			
		||||
echo "OK"
 | 
			
		||||
 | 
			
		||||
echo -n "setup gidmapping... "
 | 
			
		||||
runuser foo -g foo -c "unshare -U sleep 10 & pid=\$!; \
 | 
			
		||||
        newgidmap \$pid 0 1000 1 1 1000000 1000; ret=\$?; \
 | 
			
		||||
	cat /proc/\$pid/gid_map >/tmp/test-gidmap/gid_map;
 | 
			
		||||
        kill \$pid; exit \$ret"
 | 
			
		||||
../../common/compare_file.pl /tmp/test-gidmap/gid_map data/gid_map
 | 
			
		||||
echo "OK"
 | 
			
		||||
 | 
			
		||||
echo -n "Try to setup gidmapping with different primary group... "
 | 
			
		||||
runuser foo -g bar -c "unshare -U sleep 10 & pid=\$!; \
 | 
			
		||||
        newgidmap \$pid 0 1001 1 1 1000000 1000 2>/tmp/test-gidmap/newgidmap.err; ret=\$?; \
 | 
			
		||||
        kill \$pid; exit \$ret" && exit 1 || {
 | 
			
		||||
	status=$?
 | 
			
		||||
}
 | 
			
		||||
echo "OK"
 | 
			
		||||
 | 
			
		||||
echo -n "newgidmap returned status ($status)... "
 | 
			
		||||
test "status" != 0
 | 
			
		||||
echo "OK"
 | 
			
		||||
 | 
			
		||||
echo -n "Check that there were a failure message... "
 | 
			
		||||
grep -q 'newgidmap: Target [0-9]* is owned by a different' /tmp/test-gidmap/newgidmap.err
 | 
			
		||||
echo "error message OK."
 | 
			
		||||
log_status "$0" "SUCCESS"
 | 
			
		||||
 | 
			
		||||
sysctl -q kernel.unprivileged_userns_clone=$unpriv_userns
 | 
			
		||||
rm -rf /tmp/test-gidmap;
 | 
			
		||||
 | 
			
		||||
restore_config
 | 
			
		||||
trap '' 0
 | 
			
		||||
@@ -0,0 +1,43 @@
 | 
			
		||||
root:x:0:
 | 
			
		||||
daemon:x:1:
 | 
			
		||||
bin:x:2:
 | 
			
		||||
sys:x:3:root
 | 
			
		||||
adm:x:4:root,foo
 | 
			
		||||
tty:x:5:
 | 
			
		||||
disk:x:6:
 | 
			
		||||
lp:x:7:foo,root
 | 
			
		||||
mail:x:8:
 | 
			
		||||
news:x:9:
 | 
			
		||||
uucp:x:10:
 | 
			
		||||
man:x:12:
 | 
			
		||||
proxy:x:13:
 | 
			
		||||
kmem:x:15:
 | 
			
		||||
dialout:x:20:
 | 
			
		||||
fax:x:21:foo
 | 
			
		||||
voice:x:22:
 | 
			
		||||
cdrom:x:24:
 | 
			
		||||
floppy:x:25:foo
 | 
			
		||||
tape:x:26:
 | 
			
		||||
sudo:x:27:
 | 
			
		||||
audio:x:29:
 | 
			
		||||
dip:x:30:
 | 
			
		||||
www-data:x:33:
 | 
			
		||||
backup:x:34:
 | 
			
		||||
operator:x:37:
 | 
			
		||||
list:x:38:
 | 
			
		||||
irc:x:39:
 | 
			
		||||
src:x:40:
 | 
			
		||||
gnats:x:41:
 | 
			
		||||
shadow:x:42:
 | 
			
		||||
utmp:x:43:
 | 
			
		||||
video:x:44:
 | 
			
		||||
sasl:x:45:
 | 
			
		||||
plugdev:x:46:
 | 
			
		||||
staff:x:50:
 | 
			
		||||
games:x:60:
 | 
			
		||||
users:x:100:foo
 | 
			
		||||
nogroup:x:65534:
 | 
			
		||||
crontab:x:101:
 | 
			
		||||
Debian-exim:x:102:
 | 
			
		||||
foo:x:1000:
 | 
			
		||||
bar:x:1001:foo
 | 
			
		||||
@@ -0,0 +1,343 @@
 | 
			
		||||
#
 | 
			
		||||
# /etc/login.defs - Configuration control definitions for the login package.
 | 
			
		||||
#
 | 
			
		||||
# Three items must be defined:  MAIL_DIR, ENV_SUPATH, and ENV_PATH.
 | 
			
		||||
# If unspecified, some arbitrary (and possibly incorrect) value will
 | 
			
		||||
# be assumed.  All other items are optional - if not specified then
 | 
			
		||||
# the described action or option will be inhibited.
 | 
			
		||||
#
 | 
			
		||||
# Comment lines (lines beginning with "#") and blank lines are ignored.
 | 
			
		||||
#
 | 
			
		||||
# Modified for Linux.  --marekm
 | 
			
		||||
 | 
			
		||||
# REQUIRED for useradd/userdel/usermod
 | 
			
		||||
#   Directory where mailboxes reside, _or_ name of file, relative to the
 | 
			
		||||
#   home directory.  If you _do_ define MAIL_DIR and MAIL_FILE,
 | 
			
		||||
#   MAIL_DIR takes precedence.
 | 
			
		||||
#
 | 
			
		||||
#   Essentially:
 | 
			
		||||
#      - MAIL_DIR defines the location of users mail spool files
 | 
			
		||||
#        (for mbox use) by appending the username to MAIL_DIR as defined
 | 
			
		||||
#        below.
 | 
			
		||||
#      - MAIL_FILE defines the location of the users mail spool files as the
 | 
			
		||||
#        fully-qualified filename obtained by prepending the user home
 | 
			
		||||
#        directory before $MAIL_FILE
 | 
			
		||||
#
 | 
			
		||||
# NOTE: This is no more used for setting up users MAIL environment variable
 | 
			
		||||
#       which is, starting from shadow 4.0.12-1 in Debian, entirely the
 | 
			
		||||
#       job of the pam_mail PAM modules
 | 
			
		||||
#       See default PAM configuration files provided for
 | 
			
		||||
#       login, su, etc.
 | 
			
		||||
#
 | 
			
		||||
# This is a temporary situation: setting these variables will soon
 | 
			
		||||
# move to /etc/default/useradd and the variables will then be
 | 
			
		||||
# no more supported
 | 
			
		||||
MAIL_DIR        /var/mail
 | 
			
		||||
#MAIL_FILE      .mail
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Enable logging and display of /var/log/faillog login failure info.
 | 
			
		||||
# This option conflicts with the pam_tally PAM module.
 | 
			
		||||
#
 | 
			
		||||
FAILLOG_ENAB		yes
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Enable display of unknown usernames when login failures are recorded.
 | 
			
		||||
#
 | 
			
		||||
# WARNING: Unknown usernames may become world readable. 
 | 
			
		||||
# See #290803 and #298773 for details about how this could become a security
 | 
			
		||||
# concern
 | 
			
		||||
LOG_UNKFAIL_ENAB	no
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Enable logging of successful logins
 | 
			
		||||
#
 | 
			
		||||
LOG_OK_LOGINS		no
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Enable "syslog" logging of su activity - in addition to sulog file logging.
 | 
			
		||||
# SYSLOG_SG_ENAB does the same for newgrp and sg.
 | 
			
		||||
#
 | 
			
		||||
SYSLOG_SU_ENAB		yes
 | 
			
		||||
SYSLOG_SG_ENAB		yes
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, all su activity is logged to this file.
 | 
			
		||||
#
 | 
			
		||||
#SULOG_FILE	/var/log/sulog
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, file which maps tty line to TERM environment parameter.
 | 
			
		||||
# Each line of the file is in a format something like "vt100  tty01".
 | 
			
		||||
#
 | 
			
		||||
#TTYTYPE_FILE	/etc/ttytype
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, login failures will be logged here in a utmp format
 | 
			
		||||
# last, when invoked as lastb, will read /var/log/btmp, so...
 | 
			
		||||
#
 | 
			
		||||
FTMP_FILE	/var/log/btmp
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, the command name to display when running "su -".  For
 | 
			
		||||
# example, if this is defined as "su" then a "ps" will display the
 | 
			
		||||
# command is "-su".  If not defined, then "ps" would display the
 | 
			
		||||
# name of the shell actually being run, e.g. something like "-sh".
 | 
			
		||||
#
 | 
			
		||||
SU_NAME		su
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, file which inhibits all the usual chatter during the login
 | 
			
		||||
# sequence.  If a full pathname, then hushed mode will be enabled if the
 | 
			
		||||
# user's name or shell are found in the file.  If not a full pathname, then
 | 
			
		||||
# hushed mode will be enabled if the file exists in the user's home directory.
 | 
			
		||||
#
 | 
			
		||||
HUSHLOGIN_FILE	.hushlogin
 | 
			
		||||
#HUSHLOGIN_FILE	/etc/hushlogins
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# *REQUIRED*  The default PATH settings, for superuser and normal users.
 | 
			
		||||
#
 | 
			
		||||
# (they are minimal, add the rest in the shell startup files)
 | 
			
		||||
ENV_SUPATH	PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
 | 
			
		||||
ENV_PATH	PATH=/usr/local/bin:/usr/bin:/bin:/usr/local/games:/usr/games
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Terminal permissions
 | 
			
		||||
#
 | 
			
		||||
#	TTYGROUP	Login tty will be assigned this group ownership.
 | 
			
		||||
#	TTYPERM		Login tty will be set to this permission.
 | 
			
		||||
#
 | 
			
		||||
# If you have a "write" program which is "setgid" to a special group
 | 
			
		||||
# which owns the terminals, define TTYGROUP to the group number and
 | 
			
		||||
# TTYPERM to 0620.  Otherwise leave TTYGROUP commented out and assign
 | 
			
		||||
# TTYPERM to either 622 or 600.
 | 
			
		||||
#
 | 
			
		||||
# In Debian /usr/bin/bsd-write or similar programs are setgid tty
 | 
			
		||||
# However, the default and recommended value for TTYPERM is still 0600
 | 
			
		||||
# to not allow anyone to write to anyone else console or terminal
 | 
			
		||||
 | 
			
		||||
# Users can still allow other people to write them by issuing 
 | 
			
		||||
# the "mesg y" command.
 | 
			
		||||
 | 
			
		||||
TTYGROUP	tty
 | 
			
		||||
TTYPERM		0600
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Login configuration initializations:
 | 
			
		||||
#
 | 
			
		||||
#	ERASECHAR	Terminal ERASE character ('\010' = backspace).
 | 
			
		||||
#	KILLCHAR	Terminal KILL character ('\025' = CTRL/U).
 | 
			
		||||
#	UMASK		Default "umask" value.
 | 
			
		||||
#
 | 
			
		||||
# The ERASECHAR and KILLCHAR are used only on System V machines.
 | 
			
		||||
# 
 | 
			
		||||
# UMASK is the default umask value for pam_umask and is used by
 | 
			
		||||
# useradd and newusers to set the mode of the new home directories.
 | 
			
		||||
# 022 is the "historical" value in Debian for UMASK
 | 
			
		||||
# 027, or even 077, could be considered better for privacy
 | 
			
		||||
# There is no One True Answer here : each sysadmin must make up his/her
 | 
			
		||||
# mind.
 | 
			
		||||
#
 | 
			
		||||
# If USERGROUPS_ENAB is set to "yes", that will modify this UMASK default value
 | 
			
		||||
# for private user groups, i. e. the uid is the same as gid, and username is
 | 
			
		||||
# the same as the primary group name: for these, the user permissions will be
 | 
			
		||||
# used as group permissions, e. g. 022 will become 002.
 | 
			
		||||
#
 | 
			
		||||
# Prefix these values with "0" to get octal, "0x" to get hexadecimal.
 | 
			
		||||
#
 | 
			
		||||
ERASECHAR	0177
 | 
			
		||||
KILLCHAR	025
 | 
			
		||||
UMASK		022
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Password aging controls:
 | 
			
		||||
#
 | 
			
		||||
#	PASS_MAX_DAYS	Maximum number of days a password may be used.
 | 
			
		||||
#	PASS_MIN_DAYS	Minimum number of days allowed between password changes.
 | 
			
		||||
#	PASS_WARN_AGE	Number of days warning given before a password expires.
 | 
			
		||||
#
 | 
			
		||||
PASS_MAX_DAYS	99999
 | 
			
		||||
PASS_MIN_DAYS	0
 | 
			
		||||
PASS_WARN_AGE	7
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Min/max values for automatic uid selection in useradd
 | 
			
		||||
#
 | 
			
		||||
UID_MIN			 1000
 | 
			
		||||
UID_MAX			60000
 | 
			
		||||
# System accounts
 | 
			
		||||
#SYS_UID_MIN		  100
 | 
			
		||||
#SYS_UID_MAX		  999
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Min/max values for automatic gid selection in groupadd
 | 
			
		||||
#
 | 
			
		||||
GID_MIN			 1000
 | 
			
		||||
GID_MAX			60000
 | 
			
		||||
# System accounts
 | 
			
		||||
#SYS_GID_MIN		  100
 | 
			
		||||
#SYS_GID_MAX		  999
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Max number of login retries if password is bad. This will most likely be
 | 
			
		||||
# overriden by PAM, since the default pam_unix module has it's own built
 | 
			
		||||
# in of 3 retries. However, this is a safe fallback in case you are using
 | 
			
		||||
# an authentication module that does not enforce PAM_MAXTRIES.
 | 
			
		||||
#
 | 
			
		||||
LOGIN_RETRIES		5
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Max time in seconds for login
 | 
			
		||||
#
 | 
			
		||||
LOGIN_TIMEOUT		60
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Which fields may be changed by regular users using chfn - use
 | 
			
		||||
# any combination of letters "frwh" (full name, room number, work
 | 
			
		||||
# phone, home phone).  If not defined, no changes are allowed.
 | 
			
		||||
# For backward compatibility, "yes" = "rwh" and "no" = "frwh".
 | 
			
		||||
# 
 | 
			
		||||
CHFN_RESTRICT		rwh
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Should login be allowed if we can't cd to the home directory?
 | 
			
		||||
# Default in no.
 | 
			
		||||
#
 | 
			
		||||
DEFAULT_HOME	yes
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, this command is run when removing a user.
 | 
			
		||||
# It should remove any at/cron/print jobs etc. owned by
 | 
			
		||||
# the user to be removed (passed as the first argument).
 | 
			
		||||
#
 | 
			
		||||
#USERDEL_CMD	/usr/sbin/userdel_local
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If set to yes, userdel will remove the user's group if it contains no
 | 
			
		||||
# more members, and useradd will create by default a group with the name
 | 
			
		||||
# of the user.
 | 
			
		||||
#
 | 
			
		||||
# Other former uses of this variable such as setting the umask when
 | 
			
		||||
# user==primary group are not used in PAM environments, such as Debian
 | 
			
		||||
#
 | 
			
		||||
USERGROUPS_ENAB yes
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Instead of the real user shell, the program specified by this parameter
 | 
			
		||||
# will be launched, although its visible name (argv[0]) will be the shell's.
 | 
			
		||||
# The program may do whatever it wants (logging, additional authentification,
 | 
			
		||||
# banner, ...) before running the actual shell.
 | 
			
		||||
#
 | 
			
		||||
# FAKE_SHELL /bin/fakeshell
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, either full pathname of a file containing device names or
 | 
			
		||||
# a ":" delimited list of device names.  Root logins will be allowed only
 | 
			
		||||
# upon these devices.
 | 
			
		||||
#
 | 
			
		||||
# This variable is used by login and su.
 | 
			
		||||
#
 | 
			
		||||
#CONSOLE	/etc/consoles
 | 
			
		||||
#CONSOLE	console:tty01:tty02:tty03:tty04
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# List of groups to add to the user's supplementary group set
 | 
			
		||||
# when logging in on the console (as determined by the CONSOLE
 | 
			
		||||
# setting).  Default is none.
 | 
			
		||||
#
 | 
			
		||||
# Use with caution - it is possible for users to gain permanent
 | 
			
		||||
# access to these groups, even when not logged in on the console.
 | 
			
		||||
# How to do it is left as an exercise for the reader...
 | 
			
		||||
#
 | 
			
		||||
# This variable is used by login and su.
 | 
			
		||||
#
 | 
			
		||||
#CONSOLE_GROUPS		floppy:audio:cdrom
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If set to "yes", new passwords will be encrypted using the MD5-based
 | 
			
		||||
# algorithm compatible with the one used by recent releases of FreeBSD.
 | 
			
		||||
# It supports passwords of unlimited length and longer salt strings.
 | 
			
		||||
# Set to "no" if you need to copy encrypted passwords to other systems
 | 
			
		||||
# which don't understand the new algorithm.  Default is "no".
 | 
			
		||||
#
 | 
			
		||||
# This variable is deprecated. You should use ENCRYPT_METHOD.
 | 
			
		||||
#
 | 
			
		||||
#MD5_CRYPT_ENAB	no
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If set to MD5 , MD5-based algorithm will be used for encrypting password
 | 
			
		||||
# If set to SHA256, SHA256-based algorithm will be used for encrypting password
 | 
			
		||||
# If set to SHA512, SHA512-based algorithm will be used for encrypting password
 | 
			
		||||
# If set to DES, DES-based algorithm will be used for encrypting password (default)
 | 
			
		||||
# Overrides the MD5_CRYPT_ENAB option
 | 
			
		||||
#
 | 
			
		||||
# Note: It is recommended to use a value consistent with
 | 
			
		||||
# the PAM modules configuration.
 | 
			
		||||
#
 | 
			
		||||
ENCRYPT_METHOD SHA512
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Only used if ENCRYPT_METHOD is set to SHA256 or SHA512.
 | 
			
		||||
#
 | 
			
		||||
# Define the number of SHA rounds.
 | 
			
		||||
# With a lot of rounds, it is more difficult to brute forcing the password.
 | 
			
		||||
# But note also that it more CPU resources will be needed to authenticate
 | 
			
		||||
# users.
 | 
			
		||||
#
 | 
			
		||||
# If not specified, the libc will choose the default number of rounds (5000).
 | 
			
		||||
# The values must be inside the 1000-999999999 range.
 | 
			
		||||
# If only one of the MIN or MAX values is set, then this value will be used.
 | 
			
		||||
# If MIN > MAX, the highest value will be used.
 | 
			
		||||
#
 | 
			
		||||
# SHA_CRYPT_MIN_ROUNDS 5000
 | 
			
		||||
# SHA_CRYPT_MAX_ROUNDS 5000
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
GRANT_AUX_GROUP_SUBIDS yes
 | 
			
		||||
 | 
			
		||||
################# OBSOLETED BY PAM ##############
 | 
			
		||||
#						#
 | 
			
		||||
# These options are now handled by PAM. Please	#
 | 
			
		||||
# edit the appropriate file in /etc/pam.d/ to	#
 | 
			
		||||
# enable the equivelants of them.
 | 
			
		||||
#
 | 
			
		||||
###############
 | 
			
		||||
 | 
			
		||||
#MOTD_FILE
 | 
			
		||||
#DIALUPS_CHECK_ENAB
 | 
			
		||||
#LASTLOG_ENAB
 | 
			
		||||
#MAIL_CHECK_ENAB
 | 
			
		||||
#OBSCURE_CHECKS_ENAB
 | 
			
		||||
#PORTTIME_CHECKS_ENAB
 | 
			
		||||
#SU_WHEEL_ONLY
 | 
			
		||||
#CRACKLIB_DICTPATH
 | 
			
		||||
#PASS_CHANGE_TRIES
 | 
			
		||||
#PASS_ALWAYS_WARN
 | 
			
		||||
#ENVIRON_FILE
 | 
			
		||||
#NOLOGINS_FILE
 | 
			
		||||
#ISSUE_FILE
 | 
			
		||||
#PASS_MIN_LEN
 | 
			
		||||
#PASS_MAX_LEN
 | 
			
		||||
#ULIMIT
 | 
			
		||||
#ENV_HZ
 | 
			
		||||
#CHFN_AUTH
 | 
			
		||||
#CHSH_AUTH
 | 
			
		||||
#FAIL_DELAY
 | 
			
		||||
 | 
			
		||||
################# OBSOLETED #######################
 | 
			
		||||
#						  #
 | 
			
		||||
# These options are no more handled by shadow.    #
 | 
			
		||||
#                                                 #
 | 
			
		||||
# Shadow utilities will display a warning if they #
 | 
			
		||||
# still appear.                                   #
 | 
			
		||||
#                                                 #
 | 
			
		||||
###################################################
 | 
			
		||||
 | 
			
		||||
# CLOSE_SESSIONS
 | 
			
		||||
# LOGIN_STRING
 | 
			
		||||
# NO_PASSWORD_CONSOLE
 | 
			
		||||
# QMAIL_DIR
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@@ -0,0 +1,20 @@
 | 
			
		||||
root:x:0:0:root:/root:/bin/bash
 | 
			
		||||
daemon:x:1:1:daemon:/usr/sbin:/bin/sh
 | 
			
		||||
bin:x:2:2:bin:/bin:/bin/sh
 | 
			
		||||
sys:x:3:3:sys:/dev:/bin/sh
 | 
			
		||||
sync:x:4:65534:sync:/bin:/bin/sync
 | 
			
		||||
games:x:5:60:games:/usr/games:/bin/sh
 | 
			
		||||
man:x:6:12:man:/var/cache/man:/bin/sh
 | 
			
		||||
lp:x:7:7:lp:/var/spool/lpd:/bin/sh
 | 
			
		||||
mail:x:8:8:mail:/var/mail:/bin/sh
 | 
			
		||||
news:x:9:9:news:/var/spool/news:/bin/sh
 | 
			
		||||
uucp:x:10:10:uucp:/var/spool/uucp:/bin/sh
 | 
			
		||||
proxy:x:13:13:proxy:/bin:/bin/sh
 | 
			
		||||
www-data:x:33:33:www-data:/var/www:/bin/sh
 | 
			
		||||
backup:x:34:34:backup:/var/backups:/bin/sh
 | 
			
		||||
list:x:38:38:Mailing List Manager:/var/list:/bin/sh
 | 
			
		||||
irc:x:39:39:ircd:/var/run/ircd:/bin/sh
 | 
			
		||||
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/bin/sh
 | 
			
		||||
nobody:x:65534:65534:nobody:/nonexistent:/bin/sh
 | 
			
		||||
Debian-exim:x:102:102::/var/spool/exim4:/bin/false
 | 
			
		||||
foo:x:1000:1000::/home/foo:/bin/sh
 | 
			
		||||
@@ -0,0 +1 @@
 | 
			
		||||
foo:1000000:1000
 | 
			
		||||
@@ -0,0 +1 @@
 | 
			
		||||
foo:1000000:1000
 | 
			
		||||
@@ -0,0 +1,2 @@
 | 
			
		||||
         0       1000          1
 | 
			
		||||
         1    1000000       1000
 | 
			
		||||
@@ -0,0 +1,2 @@
 | 
			
		||||
         0       1001          1
 | 
			
		||||
         1    1000000       1000
 | 
			
		||||
							
								
								
									
										52
									
								
								tests/newgidmap/02_newgidmap_relaxed_gid_check/newgidmap.test
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										52
									
								
								tests/newgidmap/02_newgidmap_relaxed_gid_check/newgidmap.test
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,52 @@
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
 | 
			
		||||
set -e
 | 
			
		||||
 | 
			
		||||
cd $(dirname $0)
 | 
			
		||||
 | 
			
		||||
. ../../common/config.sh
 | 
			
		||||
. ../../common/log.sh
 | 
			
		||||
 | 
			
		||||
log_start "$0" "setup uid mapping when primary groups don't match"
 | 
			
		||||
 | 
			
		||||
save_config
 | 
			
		||||
 | 
			
		||||
unpriv_userns=$( sysctl -n kernel.unprivileged_userns_clone )
 | 
			
		||||
 | 
			
		||||
# restore the files on exit
 | 
			
		||||
trap 'log_status "$0" "FAILURE"; restore_config; \
 | 
			
		||||
	rm -rf /tmp/test-gidmap; \
 | 
			
		||||
        sysctl -q kernel.unprivileged_userns_clone=$unpriv_userns' 0
 | 
			
		||||
 | 
			
		||||
change_config
 | 
			
		||||
 | 
			
		||||
sysctl -q kernel.unprivileged_userns_clone=1
 | 
			
		||||
 | 
			
		||||
echo -n "Create world writable tmp directory..."
 | 
			
		||||
mkdir -m 0777 /tmp/test-gidmap
 | 
			
		||||
echo "OK"
 | 
			
		||||
 | 
			
		||||
echo -n "setup gidmapping... "
 | 
			
		||||
runuser foo -g foo -c "unshare -U sleep 10 & pid=\$!; \
 | 
			
		||||
        newgidmap \$pid 0 1000 1 1 1000000 1000; ret=\$?; \
 | 
			
		||||
	cat /proc/\$pid/gid_map >/tmp/test-gidmap/gid_map;
 | 
			
		||||
        kill \$pid; exit \$ret"
 | 
			
		||||
../../common/compare_file.pl /tmp/test-gidmap/gid_map data/gid_map
 | 
			
		||||
echo "OK"
 | 
			
		||||
 | 
			
		||||
echo -n "setup gidmapping with different primary group... "
 | 
			
		||||
runuser foo -g bar -c "unshare -U sleep 10 & pid=\$!; \
 | 
			
		||||
        newgidmap \$pid 0 1001 1 1 1000000 1000; ret=\$?; \
 | 
			
		||||
	cat /proc/\$pid/gid_map >/tmp/test-gidmap/gid_map;
 | 
			
		||||
        kill \$pid; exit \$ret"
 | 
			
		||||
../../common/compare_file.pl /tmp/test-gidmap/gid_map data/gid_map.bar
 | 
			
		||||
echo "OK"
 | 
			
		||||
 | 
			
		||||
log_status "$0" "SUCCESS"
 | 
			
		||||
 | 
			
		||||
sysctl -q kernel.unprivileged_userns_clone=$unpriv_userns
 | 
			
		||||
rm -rf /tmp/test-gidmap;
 | 
			
		||||
 | 
			
		||||
restore_config
 | 
			
		||||
trap '' 0
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										0
									
								
								tests/newuidmap/01_newuidmap/config.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										0
									
								
								tests/newuidmap/01_newuidmap/config.txt
									
									
									
									
									
										Normal file
									
								
							
							
								
								
									
										43
									
								
								tests/newuidmap/01_newuidmap/config/etc/group
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										43
									
								
								tests/newuidmap/01_newuidmap/config/etc/group
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,43 @@
 | 
			
		||||
root:x:0:
 | 
			
		||||
daemon:x:1:
 | 
			
		||||
bin:x:2:
 | 
			
		||||
sys:x:3:root
 | 
			
		||||
adm:x:4:root,foo
 | 
			
		||||
tty:x:5:
 | 
			
		||||
disk:x:6:
 | 
			
		||||
lp:x:7:foo,root
 | 
			
		||||
mail:x:8:
 | 
			
		||||
news:x:9:
 | 
			
		||||
uucp:x:10:
 | 
			
		||||
man:x:12:
 | 
			
		||||
proxy:x:13:
 | 
			
		||||
kmem:x:15:
 | 
			
		||||
dialout:x:20:
 | 
			
		||||
fax:x:21:foo
 | 
			
		||||
voice:x:22:
 | 
			
		||||
cdrom:x:24:
 | 
			
		||||
floppy:x:25:foo
 | 
			
		||||
tape:x:26:
 | 
			
		||||
sudo:x:27:
 | 
			
		||||
audio:x:29:
 | 
			
		||||
dip:x:30:
 | 
			
		||||
www-data:x:33:
 | 
			
		||||
backup:x:34:
 | 
			
		||||
operator:x:37:
 | 
			
		||||
list:x:38:
 | 
			
		||||
irc:x:39:
 | 
			
		||||
src:x:40:
 | 
			
		||||
gnats:x:41:
 | 
			
		||||
shadow:x:42:
 | 
			
		||||
utmp:x:43:
 | 
			
		||||
video:x:44:
 | 
			
		||||
sasl:x:45:
 | 
			
		||||
plugdev:x:46:
 | 
			
		||||
staff:x:50:
 | 
			
		||||
games:x:60:
 | 
			
		||||
users:x:100:foo
 | 
			
		||||
nogroup:x:65534:
 | 
			
		||||
crontab:x:101:
 | 
			
		||||
Debian-exim:x:102:
 | 
			
		||||
foo:x:1000:
 | 
			
		||||
bar:x:1001:foo
 | 
			
		||||
							
								
								
									
										344
									
								
								tests/newuidmap/01_newuidmap/config/etc/login.defs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										344
									
								
								tests/newuidmap/01_newuidmap/config/etc/login.defs
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,344 @@
 | 
			
		||||
#
 | 
			
		||||
# /etc/login.defs - Configuration control definitions for the login package.
 | 
			
		||||
#
 | 
			
		||||
# Three items must be defined:  MAIL_DIR, ENV_SUPATH, and ENV_PATH.
 | 
			
		||||
# If unspecified, some arbitrary (and possibly incorrect) value will
 | 
			
		||||
# be assumed.  All other items are optional - if not specified then
 | 
			
		||||
# the described action or option will be inhibited.
 | 
			
		||||
#
 | 
			
		||||
# Comment lines (lines beginning with "#") and blank lines are ignored.
 | 
			
		||||
#
 | 
			
		||||
# Modified for Linux.  --marekm
 | 
			
		||||
 | 
			
		||||
# REQUIRED for useradd/userdel/usermod
 | 
			
		||||
#   Directory where mailboxes reside, _or_ name of file, relative to the
 | 
			
		||||
#   home directory.  If you _do_ define MAIL_DIR and MAIL_FILE,
 | 
			
		||||
#   MAIL_DIR takes precedence.
 | 
			
		||||
#
 | 
			
		||||
#   Essentially:
 | 
			
		||||
#      - MAIL_DIR defines the location of users mail spool files
 | 
			
		||||
#        (for mbox use) by appending the username to MAIL_DIR as defined
 | 
			
		||||
#        below.
 | 
			
		||||
#      - MAIL_FILE defines the location of the users mail spool files as the
 | 
			
		||||
#        fully-qualified filename obtained by prepending the user home
 | 
			
		||||
#        directory before $MAIL_FILE
 | 
			
		||||
#
 | 
			
		||||
# NOTE: This is no more used for setting up users MAIL environment variable
 | 
			
		||||
#       which is, starting from shadow 4.0.12-1 in Debian, entirely the
 | 
			
		||||
#       job of the pam_mail PAM modules
 | 
			
		||||
#       See default PAM configuration files provided for
 | 
			
		||||
#       login, su, etc.
 | 
			
		||||
#
 | 
			
		||||
# This is a temporary situation: setting these variables will soon
 | 
			
		||||
# move to /etc/default/useradd and the variables will then be
 | 
			
		||||
# no more supported
 | 
			
		||||
MAIL_DIR        /var/mail
 | 
			
		||||
#MAIL_FILE      .mail
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Enable logging and display of /var/log/faillog login failure info.
 | 
			
		||||
# This option conflicts with the pam_tally PAM module.
 | 
			
		||||
#
 | 
			
		||||
FAILLOG_ENAB		yes
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Enable display of unknown usernames when login failures are recorded.
 | 
			
		||||
#
 | 
			
		||||
# WARNING: Unknown usernames may become world readable. 
 | 
			
		||||
# See #290803 and #298773 for details about how this could become a security
 | 
			
		||||
# concern
 | 
			
		||||
LOG_UNKFAIL_ENAB	no
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Enable logging of successful logins
 | 
			
		||||
#
 | 
			
		||||
LOG_OK_LOGINS		no
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Enable "syslog" logging of su activity - in addition to sulog file logging.
 | 
			
		||||
# SYSLOG_SG_ENAB does the same for newgrp and sg.
 | 
			
		||||
#
 | 
			
		||||
SYSLOG_SU_ENAB		yes
 | 
			
		||||
SYSLOG_SG_ENAB		yes
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, all su activity is logged to this file.
 | 
			
		||||
#
 | 
			
		||||
#SULOG_FILE	/var/log/sulog
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, file which maps tty line to TERM environment parameter.
 | 
			
		||||
# Each line of the file is in a format something like "vt100  tty01".
 | 
			
		||||
#
 | 
			
		||||
#TTYTYPE_FILE	/etc/ttytype
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, login failures will be logged here in a utmp format
 | 
			
		||||
# last, when invoked as lastb, will read /var/log/btmp, so...
 | 
			
		||||
#
 | 
			
		||||
FTMP_FILE	/var/log/btmp
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, the command name to display when running "su -".  For
 | 
			
		||||
# example, if this is defined as "su" then a "ps" will display the
 | 
			
		||||
# command is "-su".  If not defined, then "ps" would display the
 | 
			
		||||
# name of the shell actually being run, e.g. something like "-sh".
 | 
			
		||||
#
 | 
			
		||||
SU_NAME		su
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, file which inhibits all the usual chatter during the login
 | 
			
		||||
# sequence.  If a full pathname, then hushed mode will be enabled if the
 | 
			
		||||
# user's name or shell are found in the file.  If not a full pathname, then
 | 
			
		||||
# hushed mode will be enabled if the file exists in the user's home directory.
 | 
			
		||||
#
 | 
			
		||||
HUSHLOGIN_FILE	.hushlogin
 | 
			
		||||
#HUSHLOGIN_FILE	/etc/hushlogins
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# *REQUIRED*  The default PATH settings, for superuser and normal users.
 | 
			
		||||
#
 | 
			
		||||
# (they are minimal, add the rest in the shell startup files)
 | 
			
		||||
ENV_SUPATH	PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
 | 
			
		||||
ENV_PATH	PATH=/usr/local/bin:/usr/bin:/bin:/usr/local/games:/usr/games
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Terminal permissions
 | 
			
		||||
#
 | 
			
		||||
#	TTYGROUP	Login tty will be assigned this group ownership.
 | 
			
		||||
#	TTYPERM		Login tty will be set to this permission.
 | 
			
		||||
#
 | 
			
		||||
# If you have a "write" program which is "setgid" to a special group
 | 
			
		||||
# which owns the terminals, define TTYGROUP to the group number and
 | 
			
		||||
# TTYPERM to 0620.  Otherwise leave TTYGROUP commented out and assign
 | 
			
		||||
# TTYPERM to either 622 or 600.
 | 
			
		||||
#
 | 
			
		||||
# In Debian /usr/bin/bsd-write or similar programs are setgid tty
 | 
			
		||||
# However, the default and recommended value for TTYPERM is still 0600
 | 
			
		||||
# to not allow anyone to write to anyone else console or terminal
 | 
			
		||||
 | 
			
		||||
# Users can still allow other people to write them by issuing 
 | 
			
		||||
# the "mesg y" command.
 | 
			
		||||
 | 
			
		||||
TTYGROUP	tty
 | 
			
		||||
TTYPERM		0600
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Login configuration initializations:
 | 
			
		||||
#
 | 
			
		||||
#	ERASECHAR	Terminal ERASE character ('\010' = backspace).
 | 
			
		||||
#	KILLCHAR	Terminal KILL character ('\025' = CTRL/U).
 | 
			
		||||
#	UMASK		Default "umask" value.
 | 
			
		||||
#
 | 
			
		||||
# The ERASECHAR and KILLCHAR are used only on System V machines.
 | 
			
		||||
# 
 | 
			
		||||
# UMASK is the default umask value for pam_umask and is used by
 | 
			
		||||
# useradd and newusers to set the mode of the new home directories.
 | 
			
		||||
# 022 is the "historical" value in Debian for UMASK
 | 
			
		||||
# 027, or even 077, could be considered better for privacy
 | 
			
		||||
# There is no One True Answer here : each sysadmin must make up his/her
 | 
			
		||||
# mind.
 | 
			
		||||
#
 | 
			
		||||
# If USERGROUPS_ENAB is set to "yes", that will modify this UMASK default value
 | 
			
		||||
# for private user groups, i. e. the uid is the same as gid, and username is
 | 
			
		||||
# the same as the primary group name: for these, the user permissions will be
 | 
			
		||||
# used as group permissions, e. g. 022 will become 002.
 | 
			
		||||
#
 | 
			
		||||
# Prefix these values with "0" to get octal, "0x" to get hexadecimal.
 | 
			
		||||
#
 | 
			
		||||
ERASECHAR	0177
 | 
			
		||||
KILLCHAR	025
 | 
			
		||||
UMASK		022
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Password aging controls:
 | 
			
		||||
#
 | 
			
		||||
#	PASS_MAX_DAYS	Maximum number of days a password may be used.
 | 
			
		||||
#	PASS_MIN_DAYS	Minimum number of days allowed between password changes.
 | 
			
		||||
#	PASS_WARN_AGE	Number of days warning given before a password expires.
 | 
			
		||||
#
 | 
			
		||||
PASS_MAX_DAYS	99999
 | 
			
		||||
PASS_MIN_DAYS	0
 | 
			
		||||
PASS_WARN_AGE	7
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Min/max values for automatic uid selection in useradd
 | 
			
		||||
#
 | 
			
		||||
UID_MIN			 1000
 | 
			
		||||
UID_MAX			60000
 | 
			
		||||
# System accounts
 | 
			
		||||
#SYS_UID_MIN		  100
 | 
			
		||||
#SYS_UID_MAX		  999
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Min/max values for automatic gid selection in groupadd
 | 
			
		||||
#
 | 
			
		||||
GID_MIN			 1000
 | 
			
		||||
GID_MAX			60000
 | 
			
		||||
# System accounts
 | 
			
		||||
#SYS_GID_MIN		  100
 | 
			
		||||
#SYS_GID_MAX		  999
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Max number of login retries if password is bad. This will most likely be
 | 
			
		||||
# overriden by PAM, since the default pam_unix module has it's own built
 | 
			
		||||
# in of 3 retries. However, this is a safe fallback in case you are using
 | 
			
		||||
# an authentication module that does not enforce PAM_MAXTRIES.
 | 
			
		||||
#
 | 
			
		||||
LOGIN_RETRIES		5
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Max time in seconds for login
 | 
			
		||||
#
 | 
			
		||||
LOGIN_TIMEOUT		60
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Which fields may be changed by regular users using chfn - use
 | 
			
		||||
# any combination of letters "frwh" (full name, room number, work
 | 
			
		||||
# phone, home phone).  If not defined, no changes are allowed.
 | 
			
		||||
# For backward compatibility, "yes" = "rwh" and "no" = "frwh".
 | 
			
		||||
# 
 | 
			
		||||
CHFN_RESTRICT		rwh
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Should login be allowed if we can't cd to the home directory?
 | 
			
		||||
# Default in no.
 | 
			
		||||
#
 | 
			
		||||
DEFAULT_HOME	yes
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, this command is run when removing a user.
 | 
			
		||||
# It should remove any at/cron/print jobs etc. owned by
 | 
			
		||||
# the user to be removed (passed as the first argument).
 | 
			
		||||
#
 | 
			
		||||
#USERDEL_CMD	/usr/sbin/userdel_local
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If set to yes, userdel will remove the user's group if it contains no
 | 
			
		||||
# more members, and useradd will create by default a group with the name
 | 
			
		||||
# of the user.
 | 
			
		||||
#
 | 
			
		||||
# Other former uses of this variable such as setting the umask when
 | 
			
		||||
# user==primary group are not used in PAM environments, such as Debian
 | 
			
		||||
#
 | 
			
		||||
USERGROUPS_ENAB yes
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Instead of the real user shell, the program specified by this parameter
 | 
			
		||||
# will be launched, although its visible name (argv[0]) will be the shell's.
 | 
			
		||||
# The program may do whatever it wants (logging, additional authentification,
 | 
			
		||||
# banner, ...) before running the actual shell.
 | 
			
		||||
#
 | 
			
		||||
# FAKE_SHELL /bin/fakeshell
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, either full pathname of a file containing device names or
 | 
			
		||||
# a ":" delimited list of device names.  Root logins will be allowed only
 | 
			
		||||
# upon these devices.
 | 
			
		||||
#
 | 
			
		||||
# This variable is used by login and su.
 | 
			
		||||
#
 | 
			
		||||
#CONSOLE	/etc/consoles
 | 
			
		||||
#CONSOLE	console:tty01:tty02:tty03:tty04
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# List of groups to add to the user's supplementary group set
 | 
			
		||||
# when logging in on the console (as determined by the CONSOLE
 | 
			
		||||
# setting).  Default is none.
 | 
			
		||||
#
 | 
			
		||||
# Use with caution - it is possible for users to gain permanent
 | 
			
		||||
# access to these groups, even when not logged in on the console.
 | 
			
		||||
# How to do it is left as an exercise for the reader...
 | 
			
		||||
#
 | 
			
		||||
# This variable is used by login and su.
 | 
			
		||||
#
 | 
			
		||||
#CONSOLE_GROUPS		floppy:audio:cdrom
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If set to "yes", new passwords will be encrypted using the MD5-based
 | 
			
		||||
# algorithm compatible with the one used by recent releases of FreeBSD.
 | 
			
		||||
# It supports passwords of unlimited length and longer salt strings.
 | 
			
		||||
# Set to "no" if you need to copy encrypted passwords to other systems
 | 
			
		||||
# which don't understand the new algorithm.  Default is "no".
 | 
			
		||||
#
 | 
			
		||||
# This variable is deprecated. You should use ENCRYPT_METHOD.
 | 
			
		||||
#
 | 
			
		||||
#MD5_CRYPT_ENAB	no
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If set to MD5 , MD5-based algorithm will be used for encrypting password
 | 
			
		||||
# If set to SHA256, SHA256-based algorithm will be used for encrypting password
 | 
			
		||||
# If set to SHA512, SHA512-based algorithm will be used for encrypting password
 | 
			
		||||
# If set to DES, DES-based algorithm will be used for encrypting password (default)
 | 
			
		||||
# Overrides the MD5_CRYPT_ENAB option
 | 
			
		||||
#
 | 
			
		||||
# Note: It is recommended to use a value consistent with
 | 
			
		||||
# the PAM modules configuration.
 | 
			
		||||
#
 | 
			
		||||
ENCRYPT_METHOD SHA512
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Only used if ENCRYPT_METHOD is set to SHA256 or SHA512.
 | 
			
		||||
#
 | 
			
		||||
# Define the number of SHA rounds.
 | 
			
		||||
# With a lot of rounds, it is more difficult to brute forcing the password.
 | 
			
		||||
# But note also that it more CPU resources will be needed to authenticate
 | 
			
		||||
# users.
 | 
			
		||||
#
 | 
			
		||||
# If not specified, the libc will choose the default number of rounds (5000).
 | 
			
		||||
# The values must be inside the 1000-999999999 range.
 | 
			
		||||
# If only one of the MIN or MAX values is set, then this value will be used.
 | 
			
		||||
# If MIN > MAX, the highest value will be used.
 | 
			
		||||
#
 | 
			
		||||
# SHA_CRYPT_MIN_ROUNDS 5000
 | 
			
		||||
# SHA_CRYPT_MAX_ROUNDS 5000
 | 
			
		||||
 | 
			
		||||
# Enable this option to allow setting up uid/gid mapping
 | 
			
		||||
# when the user uses an alternative primary group.
 | 
			
		||||
# GRANT_AUX_GROUP_SUBIDS yes
 | 
			
		||||
 | 
			
		||||
################# OBSOLETED BY PAM ##############
 | 
			
		||||
#						#
 | 
			
		||||
# These options are now handled by PAM. Please	#
 | 
			
		||||
# edit the appropriate file in /etc/pam.d/ to	#
 | 
			
		||||
# enable the equivelants of them.
 | 
			
		||||
#
 | 
			
		||||
###############
 | 
			
		||||
 | 
			
		||||
#MOTD_FILE
 | 
			
		||||
#DIALUPS_CHECK_ENAB
 | 
			
		||||
#LASTLOG_ENAB
 | 
			
		||||
#MAIL_CHECK_ENAB
 | 
			
		||||
#OBSCURE_CHECKS_ENAB
 | 
			
		||||
#PORTTIME_CHECKS_ENAB
 | 
			
		||||
#SU_WHEEL_ONLY
 | 
			
		||||
#CRACKLIB_DICTPATH
 | 
			
		||||
#PASS_CHANGE_TRIES
 | 
			
		||||
#PASS_ALWAYS_WARN
 | 
			
		||||
#ENVIRON_FILE
 | 
			
		||||
#NOLOGINS_FILE
 | 
			
		||||
#ISSUE_FILE
 | 
			
		||||
#PASS_MIN_LEN
 | 
			
		||||
#PASS_MAX_LEN
 | 
			
		||||
#ULIMIT
 | 
			
		||||
#ENV_HZ
 | 
			
		||||
#CHFN_AUTH
 | 
			
		||||
#CHSH_AUTH
 | 
			
		||||
#FAIL_DELAY
 | 
			
		||||
 | 
			
		||||
################# OBSOLETED #######################
 | 
			
		||||
#						  #
 | 
			
		||||
# These options are no more handled by shadow.    #
 | 
			
		||||
#                                                 #
 | 
			
		||||
# Shadow utilities will display a warning if they #
 | 
			
		||||
# still appear.                                   #
 | 
			
		||||
#                                                 #
 | 
			
		||||
###################################################
 | 
			
		||||
 | 
			
		||||
# CLOSE_SESSIONS
 | 
			
		||||
# LOGIN_STRING
 | 
			
		||||
# NO_PASSWORD_CONSOLE
 | 
			
		||||
# QMAIL_DIR
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										20
									
								
								tests/newuidmap/01_newuidmap/config/etc/passwd
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										20
									
								
								tests/newuidmap/01_newuidmap/config/etc/passwd
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,20 @@
 | 
			
		||||
root:x:0:0:root:/root:/bin/bash
 | 
			
		||||
daemon:x:1:1:daemon:/usr/sbin:/bin/sh
 | 
			
		||||
bin:x:2:2:bin:/bin:/bin/sh
 | 
			
		||||
sys:x:3:3:sys:/dev:/bin/sh
 | 
			
		||||
sync:x:4:65534:sync:/bin:/bin/sync
 | 
			
		||||
games:x:5:60:games:/usr/games:/bin/sh
 | 
			
		||||
man:x:6:12:man:/var/cache/man:/bin/sh
 | 
			
		||||
lp:x:7:7:lp:/var/spool/lpd:/bin/sh
 | 
			
		||||
mail:x:8:8:mail:/var/mail:/bin/sh
 | 
			
		||||
news:x:9:9:news:/var/spool/news:/bin/sh
 | 
			
		||||
uucp:x:10:10:uucp:/var/spool/uucp:/bin/sh
 | 
			
		||||
proxy:x:13:13:proxy:/bin:/bin/sh
 | 
			
		||||
www-data:x:33:33:www-data:/var/www:/bin/sh
 | 
			
		||||
backup:x:34:34:backup:/var/backups:/bin/sh
 | 
			
		||||
list:x:38:38:Mailing List Manager:/var/list:/bin/sh
 | 
			
		||||
irc:x:39:39:ircd:/var/run/ircd:/bin/sh
 | 
			
		||||
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/bin/sh
 | 
			
		||||
nobody:x:65534:65534:nobody:/nonexistent:/bin/sh
 | 
			
		||||
Debian-exim:x:102:102::/var/spool/exim4:/bin/false
 | 
			
		||||
foo:x:1000:1000::/home/foo:/bin/sh
 | 
			
		||||
							
								
								
									
										1
									
								
								tests/newuidmap/01_newuidmap/config/etc/subgid
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								tests/newuidmap/01_newuidmap/config/etc/subgid
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1 @@
 | 
			
		||||
foo:1000000:1000
 | 
			
		||||
							
								
								
									
										1
									
								
								tests/newuidmap/01_newuidmap/config/etc/subuid
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								tests/newuidmap/01_newuidmap/config/etc/subuid
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1 @@
 | 
			
		||||
foo:1000000:1000
 | 
			
		||||
							
								
								
									
										2
									
								
								tests/newuidmap/01_newuidmap/data/uid_map
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										2
									
								
								tests/newuidmap/01_newuidmap/data/uid_map
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,2 @@
 | 
			
		||||
         0       1000          1
 | 
			
		||||
         1    1000000       1000
 | 
			
		||||
							
								
								
									
										60
									
								
								tests/newuidmap/01_newuidmap/newuidmap.test
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										60
									
								
								tests/newuidmap/01_newuidmap/newuidmap.test
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,60 @@
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
 | 
			
		||||
set -e
 | 
			
		||||
 | 
			
		||||
cd $(dirname $0)
 | 
			
		||||
 | 
			
		||||
. ../../common/config.sh
 | 
			
		||||
. ../../common/log.sh
 | 
			
		||||
 | 
			
		||||
log_start "$0" "setup uid mapping"
 | 
			
		||||
 | 
			
		||||
save_config
 | 
			
		||||
 | 
			
		||||
unpriv_userns=$( sysctl -n kernel.unprivileged_userns_clone )
 | 
			
		||||
 | 
			
		||||
# restore the system on exit
 | 
			
		||||
trap 'log_status "$0" "FAILURE"; restore_config; \
 | 
			
		||||
	rm -rf /tmp/test-uidmap; \
 | 
			
		||||
        sysctl -q kernel.unprivileged_userns_clone=$unpriv_userns' 0
 | 
			
		||||
 | 
			
		||||
change_config
 | 
			
		||||
 | 
			
		||||
echo -n "Enable unprivileged user namespaces... "
 | 
			
		||||
sysctl -q kernel.unprivileged_userns_clone=1
 | 
			
		||||
echo "OK"
 | 
			
		||||
 | 
			
		||||
echo -n "Create world writable tmp directory... "
 | 
			
		||||
mkdir -m 0777 /tmp/test-uidmap
 | 
			
		||||
echo "OK"
 | 
			
		||||
 | 
			
		||||
echo -n "setup uidmapping... "
 | 
			
		||||
runuser foo -g foo -c "unshare -U sleep 10 & pid=\$!; \
 | 
			
		||||
        newuidmap \$pid 0 1000 1 1 1000000 1000; ret=\$?; \
 | 
			
		||||
	cat /proc/\$pid/uid_map >/tmp/test-uidmap/uid_map;
 | 
			
		||||
        kill \$pid; exit \$ret"
 | 
			
		||||
../../common/compare_file.pl /tmp/test-uidmap/uid_map data/uid_map
 | 
			
		||||
echo "OK"
 | 
			
		||||
 | 
			
		||||
echo -n "Try to setup uidmapping with different primary group... "
 | 
			
		||||
runuser foo -g bar -c "unshare -U sleep 10 & pid=\$!; \
 | 
			
		||||
        newuidmap \$pid 0 1000 1 1 1000000 1000 2>/tmp/test-uidmap/newuidmap.err; ret=\$?; \
 | 
			
		||||
        kill \$pid; exit \$ret" && exit 1 || {
 | 
			
		||||
	status=$?
 | 
			
		||||
}
 | 
			
		||||
echo "OK"
 | 
			
		||||
 | 
			
		||||
echo -n "newuidmap returned status ($status)... "
 | 
			
		||||
test "status" != 0
 | 
			
		||||
echo "OK"
 | 
			
		||||
 | 
			
		||||
echo -n "Check that there were a failure message... "
 | 
			
		||||
grep -q 'newuidmap: Target process [0-9]* is owned by a different' /tmp/test-uidmap/newuidmap.err
 | 
			
		||||
echo "error message OK."
 | 
			
		||||
log_status "$0" "SUCCESS"
 | 
			
		||||
 | 
			
		||||
sysctl -q kernel.unprivileged_userns_clone=$unpriv_userns
 | 
			
		||||
rm -rf /tmp/test-uidmap;
 | 
			
		||||
 | 
			
		||||
restore_config
 | 
			
		||||
trap '' 0
 | 
			
		||||
@@ -0,0 +1,43 @@
 | 
			
		||||
root:x:0:
 | 
			
		||||
daemon:x:1:
 | 
			
		||||
bin:x:2:
 | 
			
		||||
sys:x:3:root
 | 
			
		||||
adm:x:4:root,foo
 | 
			
		||||
tty:x:5:
 | 
			
		||||
disk:x:6:
 | 
			
		||||
lp:x:7:foo,root
 | 
			
		||||
mail:x:8:
 | 
			
		||||
news:x:9:
 | 
			
		||||
uucp:x:10:
 | 
			
		||||
man:x:12:
 | 
			
		||||
proxy:x:13:
 | 
			
		||||
kmem:x:15:
 | 
			
		||||
dialout:x:20:
 | 
			
		||||
fax:x:21:foo
 | 
			
		||||
voice:x:22:
 | 
			
		||||
cdrom:x:24:
 | 
			
		||||
floppy:x:25:foo
 | 
			
		||||
tape:x:26:
 | 
			
		||||
sudo:x:27:
 | 
			
		||||
audio:x:29:
 | 
			
		||||
dip:x:30:
 | 
			
		||||
www-data:x:33:
 | 
			
		||||
backup:x:34:
 | 
			
		||||
operator:x:37:
 | 
			
		||||
list:x:38:
 | 
			
		||||
irc:x:39:
 | 
			
		||||
src:x:40:
 | 
			
		||||
gnats:x:41:
 | 
			
		||||
shadow:x:42:
 | 
			
		||||
utmp:x:43:
 | 
			
		||||
video:x:44:
 | 
			
		||||
sasl:x:45:
 | 
			
		||||
plugdev:x:46:
 | 
			
		||||
staff:x:50:
 | 
			
		||||
games:x:60:
 | 
			
		||||
users:x:100:foo
 | 
			
		||||
nogroup:x:65534:
 | 
			
		||||
crontab:x:101:
 | 
			
		||||
Debian-exim:x:102:
 | 
			
		||||
foo:x:1000:
 | 
			
		||||
bar:x:1001:foo
 | 
			
		||||
@@ -0,0 +1,343 @@
 | 
			
		||||
#
 | 
			
		||||
# /etc/login.defs - Configuration control definitions for the login package.
 | 
			
		||||
#
 | 
			
		||||
# Three items must be defined:  MAIL_DIR, ENV_SUPATH, and ENV_PATH.
 | 
			
		||||
# If unspecified, some arbitrary (and possibly incorrect) value will
 | 
			
		||||
# be assumed.  All other items are optional - if not specified then
 | 
			
		||||
# the described action or option will be inhibited.
 | 
			
		||||
#
 | 
			
		||||
# Comment lines (lines beginning with "#") and blank lines are ignored.
 | 
			
		||||
#
 | 
			
		||||
# Modified for Linux.  --marekm
 | 
			
		||||
 | 
			
		||||
# REQUIRED for useradd/userdel/usermod
 | 
			
		||||
#   Directory where mailboxes reside, _or_ name of file, relative to the
 | 
			
		||||
#   home directory.  If you _do_ define MAIL_DIR and MAIL_FILE,
 | 
			
		||||
#   MAIL_DIR takes precedence.
 | 
			
		||||
#
 | 
			
		||||
#   Essentially:
 | 
			
		||||
#      - MAIL_DIR defines the location of users mail spool files
 | 
			
		||||
#        (for mbox use) by appending the username to MAIL_DIR as defined
 | 
			
		||||
#        below.
 | 
			
		||||
#      - MAIL_FILE defines the location of the users mail spool files as the
 | 
			
		||||
#        fully-qualified filename obtained by prepending the user home
 | 
			
		||||
#        directory before $MAIL_FILE
 | 
			
		||||
#
 | 
			
		||||
# NOTE: This is no more used for setting up users MAIL environment variable
 | 
			
		||||
#       which is, starting from shadow 4.0.12-1 in Debian, entirely the
 | 
			
		||||
#       job of the pam_mail PAM modules
 | 
			
		||||
#       See default PAM configuration files provided for
 | 
			
		||||
#       login, su, etc.
 | 
			
		||||
#
 | 
			
		||||
# This is a temporary situation: setting these variables will soon
 | 
			
		||||
# move to /etc/default/useradd and the variables will then be
 | 
			
		||||
# no more supported
 | 
			
		||||
MAIL_DIR        /var/mail
 | 
			
		||||
#MAIL_FILE      .mail
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Enable logging and display of /var/log/faillog login failure info.
 | 
			
		||||
# This option conflicts with the pam_tally PAM module.
 | 
			
		||||
#
 | 
			
		||||
FAILLOG_ENAB		yes
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Enable display of unknown usernames when login failures are recorded.
 | 
			
		||||
#
 | 
			
		||||
# WARNING: Unknown usernames may become world readable. 
 | 
			
		||||
# See #290803 and #298773 for details about how this could become a security
 | 
			
		||||
# concern
 | 
			
		||||
LOG_UNKFAIL_ENAB	no
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Enable logging of successful logins
 | 
			
		||||
#
 | 
			
		||||
LOG_OK_LOGINS		no
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Enable "syslog" logging of su activity - in addition to sulog file logging.
 | 
			
		||||
# SYSLOG_SG_ENAB does the same for newgrp and sg.
 | 
			
		||||
#
 | 
			
		||||
SYSLOG_SU_ENAB		yes
 | 
			
		||||
SYSLOG_SG_ENAB		yes
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, all su activity is logged to this file.
 | 
			
		||||
#
 | 
			
		||||
#SULOG_FILE	/var/log/sulog
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, file which maps tty line to TERM environment parameter.
 | 
			
		||||
# Each line of the file is in a format something like "vt100  tty01".
 | 
			
		||||
#
 | 
			
		||||
#TTYTYPE_FILE	/etc/ttytype
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, login failures will be logged here in a utmp format
 | 
			
		||||
# last, when invoked as lastb, will read /var/log/btmp, so...
 | 
			
		||||
#
 | 
			
		||||
FTMP_FILE	/var/log/btmp
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, the command name to display when running "su -".  For
 | 
			
		||||
# example, if this is defined as "su" then a "ps" will display the
 | 
			
		||||
# command is "-su".  If not defined, then "ps" would display the
 | 
			
		||||
# name of the shell actually being run, e.g. something like "-sh".
 | 
			
		||||
#
 | 
			
		||||
SU_NAME		su
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, file which inhibits all the usual chatter during the login
 | 
			
		||||
# sequence.  If a full pathname, then hushed mode will be enabled if the
 | 
			
		||||
# user's name or shell are found in the file.  If not a full pathname, then
 | 
			
		||||
# hushed mode will be enabled if the file exists in the user's home directory.
 | 
			
		||||
#
 | 
			
		||||
HUSHLOGIN_FILE	.hushlogin
 | 
			
		||||
#HUSHLOGIN_FILE	/etc/hushlogins
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# *REQUIRED*  The default PATH settings, for superuser and normal users.
 | 
			
		||||
#
 | 
			
		||||
# (they are minimal, add the rest in the shell startup files)
 | 
			
		||||
ENV_SUPATH	PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
 | 
			
		||||
ENV_PATH	PATH=/usr/local/bin:/usr/bin:/bin:/usr/local/games:/usr/games
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Terminal permissions
 | 
			
		||||
#
 | 
			
		||||
#	TTYGROUP	Login tty will be assigned this group ownership.
 | 
			
		||||
#	TTYPERM		Login tty will be set to this permission.
 | 
			
		||||
#
 | 
			
		||||
# If you have a "write" program which is "setgid" to a special group
 | 
			
		||||
# which owns the terminals, define TTYGROUP to the group number and
 | 
			
		||||
# TTYPERM to 0620.  Otherwise leave TTYGROUP commented out and assign
 | 
			
		||||
# TTYPERM to either 622 or 600.
 | 
			
		||||
#
 | 
			
		||||
# In Debian /usr/bin/bsd-write or similar programs are setgid tty
 | 
			
		||||
# However, the default and recommended value for TTYPERM is still 0600
 | 
			
		||||
# to not allow anyone to write to anyone else console or terminal
 | 
			
		||||
 | 
			
		||||
# Users can still allow other people to write them by issuing 
 | 
			
		||||
# the "mesg y" command.
 | 
			
		||||
 | 
			
		||||
TTYGROUP	tty
 | 
			
		||||
TTYPERM		0600
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Login configuration initializations:
 | 
			
		||||
#
 | 
			
		||||
#	ERASECHAR	Terminal ERASE character ('\010' = backspace).
 | 
			
		||||
#	KILLCHAR	Terminal KILL character ('\025' = CTRL/U).
 | 
			
		||||
#	UMASK		Default "umask" value.
 | 
			
		||||
#
 | 
			
		||||
# The ERASECHAR and KILLCHAR are used only on System V machines.
 | 
			
		||||
# 
 | 
			
		||||
# UMASK is the default umask value for pam_umask and is used by
 | 
			
		||||
# useradd and newusers to set the mode of the new home directories.
 | 
			
		||||
# 022 is the "historical" value in Debian for UMASK
 | 
			
		||||
# 027, or even 077, could be considered better for privacy
 | 
			
		||||
# There is no One True Answer here : each sysadmin must make up his/her
 | 
			
		||||
# mind.
 | 
			
		||||
#
 | 
			
		||||
# If USERGROUPS_ENAB is set to "yes", that will modify this UMASK default value
 | 
			
		||||
# for private user groups, i. e. the uid is the same as gid, and username is
 | 
			
		||||
# the same as the primary group name: for these, the user permissions will be
 | 
			
		||||
# used as group permissions, e. g. 022 will become 002.
 | 
			
		||||
#
 | 
			
		||||
# Prefix these values with "0" to get octal, "0x" to get hexadecimal.
 | 
			
		||||
#
 | 
			
		||||
ERASECHAR	0177
 | 
			
		||||
KILLCHAR	025
 | 
			
		||||
UMASK		022
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Password aging controls:
 | 
			
		||||
#
 | 
			
		||||
#	PASS_MAX_DAYS	Maximum number of days a password may be used.
 | 
			
		||||
#	PASS_MIN_DAYS	Minimum number of days allowed between password changes.
 | 
			
		||||
#	PASS_WARN_AGE	Number of days warning given before a password expires.
 | 
			
		||||
#
 | 
			
		||||
PASS_MAX_DAYS	99999
 | 
			
		||||
PASS_MIN_DAYS	0
 | 
			
		||||
PASS_WARN_AGE	7
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Min/max values for automatic uid selection in useradd
 | 
			
		||||
#
 | 
			
		||||
UID_MIN			 1000
 | 
			
		||||
UID_MAX			60000
 | 
			
		||||
# System accounts
 | 
			
		||||
#SYS_UID_MIN		  100
 | 
			
		||||
#SYS_UID_MAX		  999
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Min/max values for automatic gid selection in groupadd
 | 
			
		||||
#
 | 
			
		||||
GID_MIN			 1000
 | 
			
		||||
GID_MAX			60000
 | 
			
		||||
# System accounts
 | 
			
		||||
#SYS_GID_MIN		  100
 | 
			
		||||
#SYS_GID_MAX		  999
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Max number of login retries if password is bad. This will most likely be
 | 
			
		||||
# overriden by PAM, since the default pam_unix module has it's own built
 | 
			
		||||
# in of 3 retries. However, this is a safe fallback in case you are using
 | 
			
		||||
# an authentication module that does not enforce PAM_MAXTRIES.
 | 
			
		||||
#
 | 
			
		||||
LOGIN_RETRIES		5
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Max time in seconds for login
 | 
			
		||||
#
 | 
			
		||||
LOGIN_TIMEOUT		60
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Which fields may be changed by regular users using chfn - use
 | 
			
		||||
# any combination of letters "frwh" (full name, room number, work
 | 
			
		||||
# phone, home phone).  If not defined, no changes are allowed.
 | 
			
		||||
# For backward compatibility, "yes" = "rwh" and "no" = "frwh".
 | 
			
		||||
# 
 | 
			
		||||
CHFN_RESTRICT		rwh
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Should login be allowed if we can't cd to the home directory?
 | 
			
		||||
# Default in no.
 | 
			
		||||
#
 | 
			
		||||
DEFAULT_HOME	yes
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, this command is run when removing a user.
 | 
			
		||||
# It should remove any at/cron/print jobs etc. owned by
 | 
			
		||||
# the user to be removed (passed as the first argument).
 | 
			
		||||
#
 | 
			
		||||
#USERDEL_CMD	/usr/sbin/userdel_local
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If set to yes, userdel will remove the user's group if it contains no
 | 
			
		||||
# more members, and useradd will create by default a group with the name
 | 
			
		||||
# of the user.
 | 
			
		||||
#
 | 
			
		||||
# Other former uses of this variable such as setting the umask when
 | 
			
		||||
# user==primary group are not used in PAM environments, such as Debian
 | 
			
		||||
#
 | 
			
		||||
USERGROUPS_ENAB yes
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Instead of the real user shell, the program specified by this parameter
 | 
			
		||||
# will be launched, although its visible name (argv[0]) will be the shell's.
 | 
			
		||||
# The program may do whatever it wants (logging, additional authentification,
 | 
			
		||||
# banner, ...) before running the actual shell.
 | 
			
		||||
#
 | 
			
		||||
# FAKE_SHELL /bin/fakeshell
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If defined, either full pathname of a file containing device names or
 | 
			
		||||
# a ":" delimited list of device names.  Root logins will be allowed only
 | 
			
		||||
# upon these devices.
 | 
			
		||||
#
 | 
			
		||||
# This variable is used by login and su.
 | 
			
		||||
#
 | 
			
		||||
#CONSOLE	/etc/consoles
 | 
			
		||||
#CONSOLE	console:tty01:tty02:tty03:tty04
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# List of groups to add to the user's supplementary group set
 | 
			
		||||
# when logging in on the console (as determined by the CONSOLE
 | 
			
		||||
# setting).  Default is none.
 | 
			
		||||
#
 | 
			
		||||
# Use with caution - it is possible for users to gain permanent
 | 
			
		||||
# access to these groups, even when not logged in on the console.
 | 
			
		||||
# How to do it is left as an exercise for the reader...
 | 
			
		||||
#
 | 
			
		||||
# This variable is used by login and su.
 | 
			
		||||
#
 | 
			
		||||
#CONSOLE_GROUPS		floppy:audio:cdrom
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If set to "yes", new passwords will be encrypted using the MD5-based
 | 
			
		||||
# algorithm compatible with the one used by recent releases of FreeBSD.
 | 
			
		||||
# It supports passwords of unlimited length and longer salt strings.
 | 
			
		||||
# Set to "no" if you need to copy encrypted passwords to other systems
 | 
			
		||||
# which don't understand the new algorithm.  Default is "no".
 | 
			
		||||
#
 | 
			
		||||
# This variable is deprecated. You should use ENCRYPT_METHOD.
 | 
			
		||||
#
 | 
			
		||||
#MD5_CRYPT_ENAB	no
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# If set to MD5 , MD5-based algorithm will be used for encrypting password
 | 
			
		||||
# If set to SHA256, SHA256-based algorithm will be used for encrypting password
 | 
			
		||||
# If set to SHA512, SHA512-based algorithm will be used for encrypting password
 | 
			
		||||
# If set to DES, DES-based algorithm will be used for encrypting password (default)
 | 
			
		||||
# Overrides the MD5_CRYPT_ENAB option
 | 
			
		||||
#
 | 
			
		||||
# Note: It is recommended to use a value consistent with
 | 
			
		||||
# the PAM modules configuration.
 | 
			
		||||
#
 | 
			
		||||
ENCRYPT_METHOD SHA512
 | 
			
		||||
 | 
			
		||||
#
 | 
			
		||||
# Only used if ENCRYPT_METHOD is set to SHA256 or SHA512.
 | 
			
		||||
#
 | 
			
		||||
# Define the number of SHA rounds.
 | 
			
		||||
# With a lot of rounds, it is more difficult to brute forcing the password.
 | 
			
		||||
# But note also that it more CPU resources will be needed to authenticate
 | 
			
		||||
# users.
 | 
			
		||||
#
 | 
			
		||||
# If not specified, the libc will choose the default number of rounds (5000).
 | 
			
		||||
# The values must be inside the 1000-999999999 range.
 | 
			
		||||
# If only one of the MIN or MAX values is set, then this value will be used.
 | 
			
		||||
# If MIN > MAX, the highest value will be used.
 | 
			
		||||
#
 | 
			
		||||
# SHA_CRYPT_MIN_ROUNDS 5000
 | 
			
		||||
# SHA_CRYPT_MAX_ROUNDS 5000
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
GRANT_AUX_GROUP_SUBIDS yes
 | 
			
		||||
 | 
			
		||||
################# OBSOLETED BY PAM ##############
 | 
			
		||||
#						#
 | 
			
		||||
# These options are now handled by PAM. Please	#
 | 
			
		||||
# edit the appropriate file in /etc/pam.d/ to	#
 | 
			
		||||
# enable the equivelants of them.
 | 
			
		||||
#
 | 
			
		||||
###############
 | 
			
		||||
 | 
			
		||||
#MOTD_FILE
 | 
			
		||||
#DIALUPS_CHECK_ENAB
 | 
			
		||||
#LASTLOG_ENAB
 | 
			
		||||
#MAIL_CHECK_ENAB
 | 
			
		||||
#OBSCURE_CHECKS_ENAB
 | 
			
		||||
#PORTTIME_CHECKS_ENAB
 | 
			
		||||
#SU_WHEEL_ONLY
 | 
			
		||||
#CRACKLIB_DICTPATH
 | 
			
		||||
#PASS_CHANGE_TRIES
 | 
			
		||||
#PASS_ALWAYS_WARN
 | 
			
		||||
#ENVIRON_FILE
 | 
			
		||||
#NOLOGINS_FILE
 | 
			
		||||
#ISSUE_FILE
 | 
			
		||||
#PASS_MIN_LEN
 | 
			
		||||
#PASS_MAX_LEN
 | 
			
		||||
#ULIMIT
 | 
			
		||||
#ENV_HZ
 | 
			
		||||
#CHFN_AUTH
 | 
			
		||||
#CHSH_AUTH
 | 
			
		||||
#FAIL_DELAY
 | 
			
		||||
 | 
			
		||||
################# OBSOLETED #######################
 | 
			
		||||
#						  #
 | 
			
		||||
# These options are no more handled by shadow.    #
 | 
			
		||||
#                                                 #
 | 
			
		||||
# Shadow utilities will display a warning if they #
 | 
			
		||||
# still appear.                                   #
 | 
			
		||||
#                                                 #
 | 
			
		||||
###################################################
 | 
			
		||||
 | 
			
		||||
# CLOSE_SESSIONS
 | 
			
		||||
# LOGIN_STRING
 | 
			
		||||
# NO_PASSWORD_CONSOLE
 | 
			
		||||
# QMAIL_DIR
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@@ -0,0 +1,20 @@
 | 
			
		||||
root:x:0:0:root:/root:/bin/bash
 | 
			
		||||
daemon:x:1:1:daemon:/usr/sbin:/bin/sh
 | 
			
		||||
bin:x:2:2:bin:/bin:/bin/sh
 | 
			
		||||
sys:x:3:3:sys:/dev:/bin/sh
 | 
			
		||||
sync:x:4:65534:sync:/bin:/bin/sync
 | 
			
		||||
games:x:5:60:games:/usr/games:/bin/sh
 | 
			
		||||
man:x:6:12:man:/var/cache/man:/bin/sh
 | 
			
		||||
lp:x:7:7:lp:/var/spool/lpd:/bin/sh
 | 
			
		||||
mail:x:8:8:mail:/var/mail:/bin/sh
 | 
			
		||||
news:x:9:9:news:/var/spool/news:/bin/sh
 | 
			
		||||
uucp:x:10:10:uucp:/var/spool/uucp:/bin/sh
 | 
			
		||||
proxy:x:13:13:proxy:/bin:/bin/sh
 | 
			
		||||
www-data:x:33:33:www-data:/var/www:/bin/sh
 | 
			
		||||
backup:x:34:34:backup:/var/backups:/bin/sh
 | 
			
		||||
list:x:38:38:Mailing List Manager:/var/list:/bin/sh
 | 
			
		||||
irc:x:39:39:ircd:/var/run/ircd:/bin/sh
 | 
			
		||||
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/bin/sh
 | 
			
		||||
nobody:x:65534:65534:nobody:/nonexistent:/bin/sh
 | 
			
		||||
Debian-exim:x:102:102::/var/spool/exim4:/bin/false
 | 
			
		||||
foo:x:1000:1000::/home/foo:/bin/sh
 | 
			
		||||
@@ -0,0 +1 @@
 | 
			
		||||
foo:1000000:1000
 | 
			
		||||
@@ -0,0 +1 @@
 | 
			
		||||
foo:1000000:1000
 | 
			
		||||
@@ -0,0 +1,2 @@
 | 
			
		||||
         0       1000          1
 | 
			
		||||
         1    1000000       1000
 | 
			
		||||
							
								
								
									
										52
									
								
								tests/newuidmap/02_newuidmap_relaxed_gid_check/newuidmap.test
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										52
									
								
								tests/newuidmap/02_newuidmap_relaxed_gid_check/newuidmap.test
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,52 @@
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
 | 
			
		||||
set -e
 | 
			
		||||
 | 
			
		||||
cd $(dirname $0)
 | 
			
		||||
 | 
			
		||||
. ../../common/config.sh
 | 
			
		||||
. ../../common/log.sh
 | 
			
		||||
 | 
			
		||||
log_start "$0" "setup uid mapping when primary groups don't match"
 | 
			
		||||
 | 
			
		||||
save_config
 | 
			
		||||
 | 
			
		||||
unpriv_userns=$( sysctl -n kernel.unprivileged_userns_clone )
 | 
			
		||||
 | 
			
		||||
# restore the files on exit
 | 
			
		||||
trap 'log_status "$0" "FAILURE"; restore_config; \
 | 
			
		||||
	rm -rf /tmp/test-uidmap; \
 | 
			
		||||
        sysctl -q kernel.unprivileged_userns_clone=$unpriv_userns' 0
 | 
			
		||||
 | 
			
		||||
change_config
 | 
			
		||||
 | 
			
		||||
sysctl -q kernel.unprivileged_userns_clone=1
 | 
			
		||||
 | 
			
		||||
echo -n "Create world writable tmp directory..."
 | 
			
		||||
mkdir -m 0777 /tmp/test-uidmap
 | 
			
		||||
echo "OK"
 | 
			
		||||
 | 
			
		||||
echo -n "setup uidmapping... "
 | 
			
		||||
runuser foo -g foo -c "unshare -U sleep 10 & pid=\$!; \
 | 
			
		||||
        newuidmap \$pid 0 1000 1 1 1000000 1000; ret=\$?; \
 | 
			
		||||
	cat /proc/\$pid/uid_map >/tmp/test-uidmap/uid_map;
 | 
			
		||||
        kill \$pid; exit \$ret"
 | 
			
		||||
../../common/compare_file.pl /tmp/test-uidmap/uid_map data/uid_map
 | 
			
		||||
echo "OK"
 | 
			
		||||
 | 
			
		||||
echo -n "setup uidmapping with different primary group... "
 | 
			
		||||
runuser foo -g bar -c "unshare -U sleep 10 & pid=\$!; \
 | 
			
		||||
        newuidmap \$pid 0 1000 1 1 1000000 1000; ret=\$?; \
 | 
			
		||||
	cat /proc/\$pid/uid_map >/tmp/test-uidmap/uid_map;
 | 
			
		||||
        kill \$pid; exit \$ret"
 | 
			
		||||
../../common/compare_file.pl /tmp/test-uidmap/uid_map data/uid_map
 | 
			
		||||
echo "OK"
 | 
			
		||||
 | 
			
		||||
log_status "$0" "SUCCESS"
 | 
			
		||||
 | 
			
		||||
sysctl -q kernel.unprivileged_userns_clone=$unpriv_userns
 | 
			
		||||
rm -rf /tmp/test-uidmap;
 | 
			
		||||
 | 
			
		||||
restore_config
 | 
			
		||||
trap '' 0
 | 
			
		||||
 | 
			
		||||
@@ -1292,6 +1292,10 @@ run_test ./subids/67_invalid_subuid_file1/useradd.test
 | 
			
		||||
run_test ./subids/68_invalid_subuid_file2/useradd.test
 | 
			
		||||
run_test ./subids/69_invalid_subuid_file3/useradd.test
 | 
			
		||||
run_test ./subids/70_invalid_subuid_file4/useradd.test
 | 
			
		||||
run_test ./newuidmap/01_newuidmap/newuidmap.test
 | 
			
		||||
run_test ./newuidmap/02_newuidmap_relaxed_gid_check/newuidmap.test
 | 
			
		||||
run_test ./newgidmap/01_newgidmap/newgidmap.test
 | 
			
		||||
run_test ./newgidmap/02_newgidmap_relaxed_gid_check/newgidmap.test
 | 
			
		||||
 | 
			
		||||
echo
 | 
			
		||||
echo "$succeeded test(s) passed"
 | 
			
		||||
 
 | 
			
		||||
@@ -1307,6 +1307,10 @@ run_test ./subids/67_invalid_subuid_file1/useradd.test
 | 
			
		||||
run_test ./subids/68_invalid_subuid_file2/useradd.test
 | 
			
		||||
run_test ./subids/69_invalid_subuid_file3/useradd.test
 | 
			
		||||
run_test ./subids/70_invalid_subuid_file4/useradd.test
 | 
			
		||||
run_test ./newuidmap/01_newuidmap/newuidmap.test
 | 
			
		||||
run_test ./newuidmap/02_newuidmap_relaxed_gid_check/newuidmap.test
 | 
			
		||||
run_test ./newgidmap/01_newgidmap/newgidmap.test
 | 
			
		||||
run_test ./newgidmap/02_newgidmap_relaxed_gid_check/newgidmap.test
 | 
			
		||||
 | 
			
		||||
echo
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -123,6 +123,10 @@ run_test ./su/13_su_child_success/su.test
 | 
			
		||||
run_test ./libsubid/01_list_ranges/list_ranges.test
 | 
			
		||||
run_test ./libsubid/02_get_subid_owners/get_subid_owners.test
 | 
			
		||||
run_test ./libsubid/03_add_remove/add_remove_subids.test
 | 
			
		||||
run_test ./newuidmap/01_newuidmap/newuidmap.test
 | 
			
		||||
run_test ./newuidmap/02_newuidmap_relaxed_gid_check/newuidmap.test
 | 
			
		||||
run_test ./newgidmap/01_newgidmap/newgidmap.test
 | 
			
		||||
run_test ./newgidmap/02_newgidmap_relaxed_gid_check/newgidmap.test
 | 
			
		||||
 | 
			
		||||
echo
 | 
			
		||||
echo "$succeeded test(s) passed"
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user