SSSD / sssd

A daemon to manage identity, authentication and authorization for centrally-managed systems.
https://sssd.io
GNU General Public License v3.0
598 stars 247 forks source link

[Security] Improve plain text password handling in code #4930

Closed sssd-bot closed 2 years ago

sssd-bot commented 4 years ago

Cloned from Pagure issue: https://pagure.io/SSSD/sssd/issue/3956


This is about: https://labs.portcullis.co.uk/blog/an-offensive-introduction-to-active-directory-on-unix/

After some discussions i think we can make this better my using the following:

  1. Use PR_SET_DUMPABLE for pages which have passwords etc, to ensure that coredumps dont contain cleartext passwords.

  2. Use SGX when available https://en.wikipedia.org/wiki/Software_Guard_Extensions

  3. Lastly and more importantly fedora has explicit_bzero which you should use rather manually scrub memory. Please see https://www.gnu.org/software/libc/manual/html_node/Erasing-Sensitive-Data.html This is not optimized by the compiler.

Comments


Comment from atikhonov at 2019-11-19 15:24:22

Metadata Update from @atikhonov:


Comment from atikhonov at 2019-11-28 22:41:28

PR https://github.com/SSSD/sssd/pull/948 partially addresses item (3)


Comment from pbrezina at 2019-11-29 11:23:38

Commit 0a6fdec5 relates to this ticket


Comment from pbrezina at 2019-11-29 11:23:38

Commit 109c21ef relates to this ticket


Comment from pbrezina at 2019-11-29 11:23:39

Commit ad1ae003 relates to this ticket


Comment from pbrezina at 2019-11-29 11:23:39

Commit 275e062b relates to this ticket


Comment from pbrezina at 2019-11-29 11:23:40

Commit 0165ef11 relates to this ticket


Comment from pbrezina at 2019-11-29 11:23:40

Commit f2245b53 relates to this ticket


Comment from pbrezina at 2019-11-29 11:27:20


Comment from pbrezina at 2020-03-13 14:48:10

Alexey, did the patches fix this ticket? If yes, please close it.


Comment from pbrezina at 2020-03-13 14:48:11

Metadata Update from @pbrezina:


Comment from atikhonov at 2020-03-13 15:34:45

Alexey, did the patches fix this ticket?

No. Only item (3) is partially addressed. Another question if we want (1) and (2) to be done.

alexey-tikhonov commented 2 years ago

Use SGX when available

"A pivot by Intel in 2021 resulted in the deprecation of SGX from the 11th and 12th generation Intel Core Processors, but development continues on Intel Xeon for cloud and enterprise use."

Feature is difficult to use. Taking into account limited set of platform that has hw support, benefits are very questionable.

alexey-tikhonov commented 2 years ago
1. Use PR_SET_DUMPABLE for pages which have passwords etc, to ensure
   that coredumps dont contain cleartext passwords.

I don't find a way to set PR_SET_DUMPABLE on a per page basis. Only for entire process. Having coredumps disabled unconditionally would be impractical, as it would make debugging very difficult. But perhaps we can have such a hardening option.

alexey-tikhonov commented 2 years ago

Pushed PR: https://github.com/SSSD/sssd/pull/6184