[Gluster-users] untrusted users
jim.kinney at gmail.com
Tue Oct 22 12:17:44 UTC 2019
Ah. More data. You are doing this with containers.
Take a long hard look at OpenShift. On rhel8/centos8/fedora28+ it allows devs to run containers without having root access. It's core is kubernetes.
It's a really good idea to create users inside the containers. Devs hate this (get over it!) But it separates privileges for better security.
Data sharing between users is done with group membership. Fred has his own default group. So does Wilma. They are both also in a group Flintstone. With sgid settings, all files written in a Flinstone group folder are group Flintstone but each user owns their files. Betty and Barney are also users. Neither is in Flinstone group so they have no access. They get their group, Rubble, and Flinstone can't see those files.
If a Flintstone needs to share a file with a Rubble, a common way is to copy that file to /tmp and the current owner can then chgrp to Rubble and chown to Betty. Betty now moves that file where it's needed.
If much more sharing is needed than just a file, create a third group, neighbors, and put all 4 users in it, or experiment with groups of groups and put Flintstone and Rubble groups as members (check kernel level and version of security tools. FreeIPA can also do this) and anything in the neighbors folder gets set group id neighbors and all 4 users can see it.
SELinux is a different way to do this. It blocks users from changing group permissions and forces really solid security bits to be set that protect access. Most devs start by disabling selinux as its far more sysadmin than they want to be constrained by. It also makes a system that is historically nearly unbreakable from a data/user security perspective.
On October 22, 2019 12:12:26 AM EDT, Pankaj Kumar <pankajk81 at gmail.com> wrote:
>Thanks a lot for your detailed response. Some clarifications:
>>> If they have no sudo, they can't mount. Use a centralized
>system like freeipa or IdM. Every user should have their own userid
>unique. No exceptions.
><< Every user has a user id. And they also have sudo access to their
>Take for eg, AWS. You have a user id you login with but you get root on
>Virtual Machine. We know the username but users have full access to the
>>> Make mounts for them in fstab. Set ownership and groups on mount
>so each user is restricted to their folder only.
><< If every user has his own mount point, then how does he share
>with other users?
>>> I work in HIPAA rules now, DoD clearance rules earlier. Users are
>be trusted. Other sysadmins are barely trustable. If users have any
>to adjust the system configuration in any way, take it away. That's
>job not theirs. It's easier to say no 100 times a day than spend 2
>front of lawyers explaining why untrusted users could create a mess
>involves lawyers and courts, fines and jail time.
><< Very thankful of the warning. We will do our best, get outside
>verifications, launch prizes for hacks do everything it takes. We will
>do it when we are certain. We will make sure to limit access at the
>levels. All online file sharing systems(google drive, Dropbox) do this
>thing. That's why we are thinking of writing a layer over Gluster
>to achieve this.
>>> If your OS won't support basic system security, choose something
>will. Some Linux distros are not usable in a multiple user environment
>(kali is a prime example). I work in an Enterprise environment so I use
><< We are using containers and we intend to give users a choice of base
>images. They will be the only user on their linux.
>>> Sorry to sound really harsh but this sounds like a nightmare that
>be avoided with a better sysadmin plan. Users are terrible sysadmin.
>Programmers are too. Sysadmins are not very good programmers :-(
><< That's what we are trying to do here. We like GlusterFS and I think
>can build something on top of it with only a few tweaks. It supports
>already. If we could write a layer such that we force a container to be
>able to mount as the specified user only or not mount at all, we have
>we want already.
>On Mon, Oct 21, 2019 at 8:00 PM Jim Kinney <jim.kinney at gmail.com>
>> Shell access to untrusted users. I would fight that tooth and nail as
>> sysadmin. User that are untrusted get accounts deactivated.
>> If they have no sudo, they can't mount. Make mounts for them in
>> ownership and groups on mount points so each user is restricted to
>> folder only. Use a centralized authentication system like freeipa or
>> Every user should have their own userid that's unique. No exceptions.
>> I work in HIPAA rules now, DoD clearance rules earlier. Users are not
>> be trusted. Other sysadmins are barely trustable. If users have any
>> to adjust the system configuration in any way, take it away. That's
>> job not theirs. It's easier to say no 100 times a day than spend 2
>> front of lawyers explaining why untrusted users could create a mess
>> involves lawyers and courts, fines and jail time.
>> If your OS won't support basic system security, choose something that
>> will. Some Linux distros are not usable in a multiple user
>> (kali is a prime example). I work in an Enterprise environment so I
>> If users can't get things done with out being root, someone has
>> messed up the work flow design.
>> Sorry to sound really harsh but this sounds like a nightmare that
>> avoided with a better sysadmin plan. Users are terrible sysadmin.
>> Programmers are too. Sysadmins are not very good programmers :-(
>> On October 21, 2019 10:03:46 PM EDT, pankaj kumar
>> <pankaj at datacabinet.systems> wrote:
>>> We are attaching a gluster storage to our cluster. We give shell
>>> to our cluster to untrusted users. Each user has a folder in
>>> problem is that the users could get to mount as any user id and then
>>> the other users files as their own. Is there a way to authenticate a
>>> before a mount?
>>> If there is none, can you help us implement a thin authentication
>>> over mount? Where should we get started.
>> Sent from my Android device with K-9 Mail. All tyopes are thumb
>> and reflect authenticity.
>> Community Meeting Calendar:
>> APAC Schedule -
>> Every 2nd and 4th Tuesday at 11:30 AM IST
>> Bridge: https://bluejeans.com/118564314
>> NA/EMEA Schedule -
>> Every 1st and 3rd Tuesday at 01:00 PM EDT
>> Bridge: https://bluejeans.com/118564314
>> Gluster-users mailing list
>> Gluster-users at gluster.org
Sent from my Android device with K-9 Mail. All tyopes are thumb related and reflect authenticity.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Gluster-users