severity 425831 wishlist
title 425831 please guard sudo and su sessions as well
tags 425831 help
thanks

> This package only works if you're still using the account you
> logged in as.  Logging in as a normal user, then using sudo or su
> for root privileges, breaks the SSH test.

I have not had the time to investigate how to test for the common
cases you list. In case you want to speed things up, please consider
sending precise information or even a patch. What I need are obvious
characteristics that I can use to distinguish remote sessions from
local ones. Unfortunately, sudo purges $SSH_CONNECTION from the
environment, and su does not propagate it either.

One way to do it might be to obtain the current terminal node and
check whether it was created by sshd:

  PTS=$(readlink /proc/$$/fd/0)
  pgrep -f "^sshd.+${PTS#/dev/}$" >/dev/null

I'll put this suggestion by Craig Small and Don Armstrong into the
next version.

Otherwise, if molly-guard does not suit your purpose, then I suggest
you purge it.

-- 
 .''`.   martin f. krafft <[EMAIL PROTECTED]>
: :'  :  proud Debian developer, author, administrator, and user
`. `'`   http://people.debian.org/~madduck - http://debiansystem.info
  `-  Debian - when you have better things to do than fixing systems

Attachment: signature.asc
Description: Digital signature (GPG/PGP)

Reply via email to