Summary: | not filtered by default shell /bin/nologin | ||
---|---|---|---|
Product: | accountsservice | Reporter: | Joseph Daniel Zukiger <joudanzuki> |
Component: | general | Assignee: | Matthias Clasen <mclasen> |
Status: | RESOLVED FIXED | QA Contact: | |
Severity: | critical | ||
Priority: | medium | CC: | bugzilla, oliver.henshaw, rstrode |
Version: | unspecified | ||
Hardware: | x86 (IA32) | ||
OS: | Linux (All) | ||
See Also: |
https://bugs.freedesktop.org/show_bug.cgi?id=41908 https://bugzilla.gnome.org/show_bug.cgi?id=643441 https://bugzilla.redhat.com/show_bug.cgi?id=670244 https://bugzilla.redhat.com/show_bug.cgi?id=583080 https://bugzilla.redhat.com/show_bug.cgi?id=604965 https://bugzilla.redhat.com/show_bug.cgi?id=708275 |
||
Whiteboard: | |||
i915 platform: | i915 features: | ||
Attachments: |
Don't use hard-coded minimal UID to exclude users
Filter users on nologin rather than minimal UID |
Description
Joseph Daniel Zukiger
2012-01-02 21:08:01 UTC
Looks like the code to do nologin filtering got lost when moving things from gdm to the accountsservice. We should bring it back. Created attachment 58111 [details] [review] Don't use hard-coded minimal UID to exclude users We should instead filter on the login shell used. Created attachment 58113 [details] [review] Filter users on nologin rather than minimal UID Requires the patch from: https://bugs.freedesktop.org/show_bug.cgi?id=47045 but you might be able to merge it in if you're not interested in the transient correctness ;) Comment on attachment 58111 [details] [review] Don't use hard-coded minimal UID to exclude users Review of attachment 58111 [details] [review]: ----------------------------------------------------------------- Not sure I agree with this one. Yes, we should filter on the login shell. But that doesn't mean that we should ignore the minimal uid Comment on attachment 58111 [details] [review] Don't use hard-coded minimal UID to exclude users Review of attachment 58111 [details] [review]: ----------------------------------------------------------------- Just looking at my /etc/passwd, there's odd things like sync and halt, which are not /sbin/nologin (In reply to comment #5) <snip> > Not sure I agree with this one. > Yes, we should filter on the login shell. But that doesn't mean that we should > ignore the minimal uid The minimal UID is only useful to create new users, nothing else. In fact it creates problems with perfectly normal administration policies (like adding new users should start from UID 5000, but users local to the machine get 500 and above, for example). (In reply to comment #6) > Just looking at my /etc/passwd, there's odd things like sync and halt, which > are not /sbin/nologin They're already ignored, see the daemon->priv->exclusions hash_table that has every item in default_excludes[] added. The same scheme work for GDM in the past. (In reply to comment #5) <snip> > Not sure I agree with this one. > Yes, we should filter on the login shell. But that doesn't mean that we should > ignore the minimal uid The minimal UID is only useful to create new users, nothing else. In fact it creates problems with perfectly normal administration policies (like adding new users should start from UID 5000, but users local to the machine get 500 and above, for example). (In reply to comment #6) > Just looking at my /etc/passwd, there's odd things like sync and halt, which > are not /sbin/nologin They're already ignored, see the daemon->priv->exclusions hash_table that has every item in default_excludes[] added. The same scheme work for GDM in the past. Comment on attachment 58111 [details] [review] Don't use hard-coded minimal UID to exclude users Review of attachment 58111 [details] [review]: ----------------------------------------------------------------- Ok, after rereading the docs for UID_MIN, I agree now. I've pushed this in now with a few changes to also catch /bin/false and /usr/sbin/nologin. |
Use of freedesktop.org services, including Bugzilla, is subject to our Code of Conduct. How we collect and use information is described in our Privacy Policy.