Debian Bug report logs -
#1033728
sudo-ldap might be removed post-trixie
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, Sudo Maintainers <sudo@packages.debian.org>:
Bug#1033728; Package sudo-ldap.
(Fri, 31 Mar 2023 07:45:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Marc Haber <mh+debian-packages@zugschlus.de>:
New Bug report received and forwarded. Copy sent to Sudo Maintainers <sudo@packages.debian.org>.
(Fri, 31 Mar 2023 07:45:04 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: sudo-ldap
Severity: important
The sudo-ldap package is difficult to maintain. It is, however, still
more popular than the more modern and more flexible libnss-sudo, see
https://qa.debian.org/popcon.php?package=sudo
I'd like to ask the users of the sudo-ldap package why they are not
using libnss-sudo. I am especially interested in things that sudo-ldap
does better than libsss-sudo.
Most current deployments of LDAP with Linux clients for console and ssh
login are likely to be using sssd the uid and password management
anyway, so it seems just natural to use sss for sudo management as well.
Please add your reasons to this bug, so that the sudo maintainers can
properly consider the reasons in their decision.
Greetings
Marc
Information forwarded
to debian-bugs-dist@lists.debian.org, Sudo Maintainers <sudo@packages.debian.org>:
Bug#1033728; Package sudo-ldap.
(Mon, 26 Jun 2023 07:30:05 GMT) (full text, mbox, link).
Acknowledgement sent
to "Trent W. Buck" <trentbuck@gmail.com>:
Extra info received and forwarded to list. Copy sent to Sudo Maintainers <sudo@packages.debian.org>.
(Mon, 26 Jun 2023 07:30:05 GMT) (full text, mbox, link).
Message #10 received at 1033728@bugs.debian.org (full text, mbox, reply):
On Fri 31 Mar 2023 09:41:16 +0200, Marc Haber wrote:
> Please add your reasons to this bug, so that the sudo maintainers can
> properly consider the reasons in their decision.
I personally DON'T need sudo-ldap anymore.
1. I ran sudo-ldap + slapd on an Ubuntu 10.04 farm until 2022.
It was mainly for things like "sudo eject" (back when blank CDs were expensive, and HAL was still a thing) and
"sudo ldapadduser" (to let managers onboard staff & create mailing lists without sysadmin help).
I was planning to replace it with a "pure" samba AD stack, but the Windows-iness just got Too Hard, so
I ended up going back to plain /etc/shadow and /etc/sudoers.d, now managed by ansible.
2. I set up sssd in 2022 at another site, on SLES 12, aimed at a Windows AD stack.
I wasn't allowed to use sssd for sudo, though, so that site is still using sudoers.d (also via ansible).
It wasn't clear if sssd-sudo required me to add additional schemata to AD, like sudoers-ldap does.
If NOT, that would definitely be an advantage for sssd-ldap over sudo-ldap :-)
3. I run de Jong's libnss-ldapd / libpam-ldapd at another site, and it works well there, but again,
the sudo rules are simple enough they get hard-coded into sudoers.d.
I like https://manpages.debian.org/slapo-ppolicy.
4. For automated machine-to-machine jobs (e.g. zfs send/receive) I prefer to skip sudo altogether.
For example, I now use https://manpages.debian.org/zfs-allow to let a non-root system user
"zfs-receive-trinity" have permission to mess with ZFS dataset "morpheus/srv/backup/trinity".
I've been thinking about https://archive.org/details/lca2020-Zero_Trust_SSH but
right now I'm still just using Ed25519 keypairs for everything.
5. One thing I do really appreciate is that the sudoers.ldap objects
are MUCH easier to understand than an equivalent sudoers.d config file.
dn: cn=responsible,ou=groups,o=cyber
objectClass: posixGroup
description: Staff responsible for OUR systems and networks.
description: I often reflect that if "privileges" had been called "responsibilities" or "duties", I would have saved thousands of hours explaining to people why they were only gonna get them over my dead body. -- Lee K. Gleason, VMS sysadmin
gidNumber: 2049
memberUID: twb
memberUID: REDACTED
dn: cn=defaults,ou=sudoers,o=cyber
objectClass: sudoRole
sudoOption: always_set_home
sudoOption: env_reset
sudoOption: ignore_dot
sudoOption: ignore_local_sudoers
sudoOption: insults
sudoOption: !setenv
sudoOption: set_logname
dn: cn=%responsible,ou=sudoers,o=cyber
objectClass: sudoRole
sudoUser: %responsible
sudoHost: ALL
sudoRunAsUser: ALL
sudoRunAsGroup: ALL
sudoCommand: ALL
sudoOption: !authenticate
dn: cn=bbq,ou=sudoers,o=cyber
description: Staff need this to burn CDs and DVDs on BBQ.
objectClass: sudoRole
sudoUser: %cyber
sudoHost: bbq
sudoRunAsUser:
sudoRunAsGroup: cdrom
sudoCommand: /usr/bin/wodim
sudoCommand: /usr/bin/cdrecord
sudoOption: noexec
When I read an /etc/sudoers.d/ugh.conf I often start by reading
https://manpages.debian.org/sudoers.ldap just so I don't go mad.
If sudo could have the sudo-ldap format in flat file, I'd be happier.
At least in cases when I have more than "%sudo (ALL:ALL) NOPASSWD: ALL".
As an analogy, consider how much nicer it is now we can use
/etc/apt/sources.list.d/debian.sources (deb822 format)
instead of the old
/etc/apt/sources.list.d/debian.list (legacy format)
Information forwarded
to debian-bugs-dist@lists.debian.org, Sudo Maintainers <sudo@packages.debian.org>:
Bug#1033728; Package sudo-ldap.
(Mon, 26 Jun 2023 09:27:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Marc Haber <mh+debian-packages@zugschlus.de>:
Extra info received and forwarded to list. Copy sent to Sudo Maintainers <sudo@packages.debian.org>.
(Mon, 26 Jun 2023 09:27:03 GMT) (full text, mbox, link).
Message #15 received at 1033728@bugs.debian.org (full text, mbox, reply):
On Mon, Jun 26, 2023 at 05:27:10PM +1000, Trent W. Buck wrote:
> I personally DON'T need sudo-ldap anymore.
Thanks for your help anyway, your use cases helped me to understand
things a bit better.
Greetings
Marc
--
-----------------------------------------------------------------------------
Marc Haber | "I don't trust Computers. They | Mailadresse im Header
Leimen, Germany | lose things." Winona Ryder | Fon: *49 6224 1600402
Nordisch by Nature | How to make an American Quilt | Fax: *49 6224 1600421
Information forwarded
to debian-bugs-dist@lists.debian.org, Sudo Maintainers <sudo@packages.debian.org>:
Bug#1033728; Package sudo-ldap.
(Tue, 25 Jul 2023 14:24:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Marc Haber <mh+debian-packages@zugschlus.de>:
Extra info received and forwarded to list. Copy sent to Sudo Maintainers <sudo@packages.debian.org>.
(Tue, 25 Jul 2023 14:24:03 GMT) (full text, mbox, link).
Message #20 received at 1033728@bugs.debian.org (full text, mbox, reply):
In case that we as the sudo maintainers decide to deprecate sudo-ldap,
how would we do that? I think that we should still ship a functional
sudo-ldap in trixie, but we might have to give a rather prominent
warning. What would we do?
1: Change the Package Description and add a NEWS.Debian entry
2: Add a debconf warning that shows on package installation?
3: Patch in a warning like the lecture that is given on first
invocation?
4: something else?
Would we, after the trixie release:
a: ship an empty transitional sudo-ldap that depends on regular sudo?
b: just remove sudo-ldap and have regular sudo conflict (break?) the
old sudo-ldap?
c: something else?
What does the team think?
Greetings
Marc
--
-----------------------------------------------------------------------------
Marc Haber | "I don't trust Computers. They | Mailadresse im Header
Leimen, Germany | lose things." Winona Ryder | Fon: *49 6224 1600402
Nordisch by Nature | How to make an American Quilt | Fax: *49 6224 1600421
Changed Bug title to 'sudo-ldap might be removed post-trixie' from 'sudo-ldap might be removed post-bookworm or post-trixie'.
Request was from Marc Haber <mh+debian-packages@zugschlus.de>
to control@bugs.debian.org.
(Tue, 12 Dec 2023 11:15:02 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Tue Jan 30 05:37:46 2024;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.