Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Conversation

@adombeck
Copy link
Contributor

@adombeck adombeck commented Oct 6, 2025

First draft of a security overview for authd. See the Jira ticket for context.

UDENG-7652

TODO

@adombeck adombeck force-pushed the UDENG-7652-security-overview branch 7 times, most recently from bdf390b to 5fb86f6 Compare October 7, 2025 14:51
@adombeck
Copy link
Contributor Author

adombeck commented Oct 7, 2025

I decided to not document how we protect communication between authd components for now, because that would be a pretty long section and require explaining the architecture in more detail than it's currently explained on https://documentation.ubuntu.com/authd/stable-docs/explanation/authd-architecture/ (that's missing the authd PAM Go binary which communicates with the PAM module via a private D-Bus server). I'll need more time for that than I planned for this issue for now (and if we do create that section, we might also want to update the architecture page).

@adombeck adombeck marked this pull request as ready for review October 7, 2025 15:06
@adombeck adombeck requested a review from a team as a code owner October 7, 2025 15:06
@adombeck adombeck requested a review from edibotopic October 7, 2025 15:06
@adombeck adombeck force-pushed the UDENG-7652-security-overview branch 3 times, most recently from cfb7c61 to cd246c4 Compare October 7, 2025 15:10
@adombeck
Copy link
Contributor Author

adombeck commented Oct 7, 2025

@edibotopic I'm sure there are many things to improve here. Feel free to make changes as you see fit.

@edibotopic
Copy link
Contributor

Will do @adombeck .

Updating the arch section, as you mention, is a good idea, but it can wait until the next cycle.

Copy link
Contributor

@edibotopic edibotopic left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Excellent work @adombeck .

This is a very comprehensive overview and links well with the rest of the documentation.

Mostly minor suggestions from me, but the overall content and structure looks good.

@adombeck adombeck force-pushed the UDENG-7652-security-overview branch 5 times, most recently from f89f720 to 4010159 Compare October 8, 2025 12:19
@adombeck
Copy link
Contributor Author

adombeck commented Oct 8, 2025

@edibotopic Thanks for the excellent review! I think addressed all your comments now.

@adombeck adombeck force-pushed the UDENG-7652-security-overview branch from 4010159 to 44ea7ee Compare October 8, 2025 13:12
Copy link
Contributor

@edibotopic edibotopic left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

One additional fix for the important block.

Thanks again. It's a nice addition to the docs.

Co-authored-by: Shane Crowley <[email protected]>
@adombeck adombeck force-pushed the UDENG-7652-security-overview branch from 44ea7ee to ed4eaae Compare October 8, 2025 13:29
@adombeck adombeck requested a review from edibotopic October 8, 2025 13:34
@adombeck adombeck merged commit 9c047d9 into main Oct 8, 2025
4 checks passed
@adombeck adombeck deleted the UDENG-7652-security-overview branch October 8, 2025 13:59
@adombeck adombeck mentioned this pull request Oct 8, 2025
Comment on lines +137 to +138
existing users or groups on the system. However, if a user or group is later
removed, or if the entire authd database (`/var/lib/authd/authd.sqlite3`) is
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@adombeck maybe we should add a card to keep the removed users as disabled users forever, so that those UIDs/GIDs are never re-used as they may imply that another user (created at later point) could access to files owned by the old one.

Copy link
Contributor Author

@adombeck adombeck Oct 9, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we should provide a way to actually free up previously used UIDs/GIDs. The situation is not different from deluser which also removes the UID and allows it to be reused by new user accounts - except that authd automatically creates new user accounts, which is one way UIDs could be reused.

We already had discussions around that, which resulted in the updated description of #640. The plan is to warn the user about UID/GID reuse when they try to delete a user/group and ask for confirmation.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If you want to check some previous literature on this:

In general cleaning up old IDs isn't a big deal as we should have enough available values anyways.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants