NetworkManager/contrib
Thomas Haller f137b32d31
sudo: introduce nm-sudo D-Bus service
NetworkManager runs as root and has lots of capabilities.
We want to reduce the attach surface by dropping capabilities,
but there is a genuine need to do certain things.

For example, we currently require dac_override capability, to open
the unix socket of ovsdb. Most users wouldn't use OVS, so we should
find a way to not require that dac_override capability. The solution
is to have a separate, D-Bus activate service (nm-sudo), which
has the capability to open and provide the file descriptor.

For authentication, we only rely on D-Bus. We watch the name owner
of NetworkManager, and only accept requests from that service. We trust
D-Bus to get it right a request from that name owner is really coming
from NetworkManager. If we couldn't trust that, how could PolicyKit
or any authentication via D-Bus work? For testing, the user can set
NM_SUDO_NO_AUTH_FOR_TESTING=1.

https://bugzilla.redhat.com/show_bug.cgi?id=1921826
2021-07-26 15:31:46 +02:00
..
alpine gitlab-ci: install missing packages on Alpine Linux 2020-12-23 10:48:26 +01:00
art/logo artwork: introduce NetworkManager stickers 2019-09-30 17:36:59 +02:00
debian Revert "contrib: no longer install libuuid as build dependency" 2021-05-26 22:16:35 +02:00
editors contrib: add emacs config for hacking on NM 2015-08-11 13:42:26 -04:00
fedora sudo: introduce nm-sudo D-Bus service 2021-07-26 15:31:46 +02:00
scripts glib-aux: add nm_g_idle_add() 2021-07-26 15:30:04 +02:00