Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 13 Mar 2017 09:31:43 -0000
From:      DaLynX <d@l.ynx.fr>
To:        "CyberLeo Kitsana" <cyberleo@cyberleo.net>
Cc:        freebsd-questions <freebsd-questions@freebsd.org>
Subject:   Re: Jail limited user cannot access host mountpoint although jail root can
Message-ID:  <bKefnGr5uJG9Iq4fztHkwcazXH4k2cJ7xb2L2NWN21ab@mailpile>
In-Reply-To: <90c205ea-fbaf-14de-4c83-81421838510b@cyberleo.net>
References:  <90c205ea-fbaf-14de-4c83-81421838510b@cyberleo.net>

next in thread | previous in thread | raw e-mail | index | archive | help
CyberLeo Kitsana <cyberleo@cyberleo.net> wrote:
> 
> Fuse filesystems include an additional security measure by
> default whereby only the uid of the mounter is permitted to
> access the mountpoint; even root is forbidden from accessing
> non-root fuse mounts.
> 
> Read up on the allow_other fuse mount option for further
> details.
>

Yes, that was it! Thank you very much for your help!

I still cannot mount fuse from inside the jail, and I understand
it is because it is not jail-friendly (as listed by lsvfs), but I
can mount them from the host and access them correctly inside.
From owner-freebsd-questions@freebsd.org  Mon Mar 13 19:41:57 2017
Return-Path: <owner-freebsd-questions@freebsd.org>
Delivered-To: freebsd-questions@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
 [IPv6:2001:1900:2254:206a::19:1])
 by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3E5C3D0A1D8
 for <freebsd-questions@mailman.ysv.freebsd.org>;
 Mon, 13 Mar 2017 19:41:57 +0000 (UTC)
 (envelope-from freebsd@omnilan.de)
Received: from mx0.gentlemail.de (mx0.gentlemail.de [IPv6:2a00:e10:2800::a130])
 (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
 (Client did not present a certificate)
 by mx1.freebsd.org (Postfix) with ESMTPS id B62CA14ED
 for <freebsd-questions@freebsd.org>; Mon, 13 Mar 2017 19:41:56 +0000 (UTC)
 (envelope-from freebsd@omnilan.de)
Received: from mh0.gentlemail.de (ezra.dcm1.omnilan.net
 [IPv6:2a00:e10:2800::a135])
 by mx0.gentlemail.de (8.14.5/8.14.5) with ESMTP id v2DJapQr054781;
 Mon, 13 Mar 2017 20:36:51 +0100 (CET)
 (envelope-from freebsd@omnilan.de)
Received: from titan.inop.mo1.omnilan.net (titan.inop.mo1.omnilan.net
 [IPv6:2001:a60:f0bb:1::3:1])
 (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mh0.gentlemail.de (Postfix) with ESMTPSA id 496F37C2;
 Mon, 13 Mar 2017 20:36:51 +0100 (CET)
Message-ID: <58C6F4D2.1050203@omnilan.de>
Date: Mon, 13 Mar 2017 20:36:50 +0100
From: Harry Schmalzbauer <freebsd@omnilan.de>
Organization: OmniLAN
User-Agent: Mozilla/5.0 (X11; U; FreeBSD i386; de-DE;
 rv:1.9.2.8) Gecko/20100906 Lightning/1.0b2 Thunderbird/3.1.2
MIME-Version: 1.0
To: Doug McIntyre <merlyn@geeks.org>
CC: freebsd-questions@freebsd.org
Subject: Re: sudo alternatives; for the minimalists
References: <58C6BDC0.7070307@omnilan.de>
 <CAByiw+p0cM+O-wd8uoo0Kp8BNEiQvrrmQuK858ALAR9bTfJThA@mail.gmail.com>
 <58C6D50B.8030803@omnilan.de> <20170313173427.GA83078@geeks.org>
In-Reply-To: <20170313173427.GA83078@geeks.org>
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: 8bit
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.2.7
 (mx0.gentlemail.de [IPv6:2a00:e10:2800::a130]);
 Mon, 13 Mar 2017 20:36:51 +0100 (CET)
X-Milter: Spamilter (Reciever: mx0.gentlemail.de; Sender-ip: ;
 Sender-helo: mh0.gentlemail.de; )
X-BeenThere: freebsd-questions@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: User questions <freebsd-questions.freebsd.org>
List-Unsubscribe: <https://lists.freebsd.org/mailman/options/freebsd-questions>, 
 <mailto:freebsd-questions-request@freebsd.org?subject=unsubscribe>
List-Archive: <http://lists.freebsd.org/pipermail/freebsd-questions/>;
List-Post: <mailto:freebsd-questions@freebsd.org>
List-Help: <mailto:freebsd-questions-request@freebsd.org?subject=help>
List-Subscribe: <https://lists.freebsd.org/mailman/listinfo/freebsd-questions>, 
 <mailto:freebsd-questions-request@freebsd.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Mar 2017 19:41:57 -0000

Bezüglich Doug McIntyre's Nachricht vom 13.03.2017 18:34 (localtime):
> On Mon, Mar 13, 2017 at 06:21:15PM +0100, Harry Schmalzbauer wrote:
>> Bezüglich Phil Eaton's Nachricht vom 13.03.2017 16:48 (localtime):
>>> How do you feel about the security/doas port from OpenBSD?
>>
>> Thanks, most likely worth a look. But it has no credentials caching,
>> does it?
>> That's my most wanted feature, otherwise I'm still fine with su (no
>> classic user privileging needed, only for admin tasks)
> 
> I think you are collapsing two features into one with this requirement,
> and I'm not sure what you are expecting.
> 
> One way to do what I think you are looking for is you can use SSH
> public-key auth to PAM authenticate in as root priviledges into a server.
> 
> eg. see this discussion thread.
> 
> https://forums.freebsd.org/threads/35645/
> 
> 
> Another way keychain/SSH is used, is as an ssh-agent (probably likely
> of what you are looking for)
> 
> I was trying to find a decent web page (ie. more than a mention
> of how to run ssh-agent), but ran across a wrapper that did a bit
> more with it for you.
> 
> http://www.funtoo.org/index.php?title=Keychain
> 
> with links to a better description of ssh-agent and using it, even if
> they are a bit dated (ie. ignore the part about DSA keys altogether).


Thanks, but I'm really only looking for some kind of "'su -c'-credential
caching".

I'm using gpg-agent eversince which handles my ssh-keys perfectly.  But
of course I'm not logging in as SuperUser, just regular user with
wheel-membership.

So I'm logged in by pub-key-auth with passphrase from gpg-agent as
regular user – convinient so far.

But now I have to re-type the SuperUser password any time I utilize 'su
-c', which is often :-(
On MacOS, I just have to do SuperUser privilege authorization once, then
sudo doesn't ask on subsequent call.
That's what I'm looking for :-)

Thanks,

-harry



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bKefnGr5uJG9Iq4fztHkwcazXH4k2cJ7xb2L2NWN21ab>