You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Protocol "exec" denies to execute any programs, if running as root, see MeterExec.cpp - L123 ff. The option offered in the error message is to recompile vzlogger to allow this using a compile time configuration setting, that allows to call external programs as root.
Instead Exec should:
Drop elevated privileges, if executed as root, before running the external script.
Add a Username or UID parameter that specifies which uid to execute the command as in the configuration.
In addition popen uses the default shell, which seems to potentially be open for attacks (reading the cookbook cited below).
OR
at least recommend using protocol "exec" only when invoking vzlogger as a normal user.
r00t-
changed the title
protocol "exec" should drop elevated privileges instead of recompiling to allow popen as root
protocol "exec" should drop elevated privileges instead of suggesting to recompile to allow popen as root
Mar 17, 2023
i don't think this is a real issue.
the default behaviour is safe, and recompiling to change behaviour is out of scope of any security considerations.
(but indeed we should probably recommend to avoid running as root instead of recommending to recompile.)
but improvements are always welcome of course!
also, the more critical improvement might be to provide the infrastructure (systemd service file, udev rules) to simply avoid running as root?
Protocol "exec" denies to execute any programs, if running as root, see MeterExec.cpp - L123 ff. The option offered in the error message is to recompile vzlogger to allow this using a compile time configuration setting, that allows to call external programs as root.
Instead Exec should:
Username
orUID
parameter that specifies which uid to execute the command as in the configuration.popen
uses the default shell, which seems to potentially be open for attacks (reading the cookbook cited below).OR
Example code for dropping elevated privileges can be found in "Secure Programming Cookbook for C and C++ by John Viega, Matt Messier", Recipes 1.3, 1.6, 1.7. (but I am not sure this fully applies).
The text was updated successfully, but these errors were encountered: