From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6654882193514430464 X-Received: by 2002:a1c:ac87:: with SMTP id v129mr638485wme.20.1549539377659; Thu, 07 Feb 2019 03:36:17 -0800 (PST) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a7b:c4ce:: with SMTP id g14ls258178wmk.13.gmail; Thu, 07 Feb 2019 03:36:17 -0800 (PST) X-Google-Smtp-Source: AHgI3IbsaJkoD37t7Px/eiHQ9yUBulOIMbnsuhHXIBdWpLOp96uam74I15/wCcBAjz64fIY2ex7z X-Received: by 2002:a1c:2088:: with SMTP id g130mr610601wmg.6.1549539377046; Thu, 07 Feb 2019 03:36:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549539377; cv=none; d=google.com; s=arc-20160816; b=COEBy4K093ZmSOJIGdbGKG1EX8BUqK1vvc17pzwrLNvTSSrJnd0GR4vZVjX74U3mo7 8j+1JlxH4SD4EbLLU6srup/J3oYgBnSgAd/9tOJg+oV9Xq+mmmuKN1j9ahqcv2vAZnzE j7igKqLh+0axhd2h4dwmJkTV6inZskkILqJScX5TKeiF6TpoQm971Xx0NJizHS6Myh4M C5uvfRf9RgY0Ka1k0uKeHLLLBA0YhXDoeH09rwQGwdGfxnEQcfs3q+88Qojy0GtzBKps AuYlczx1kM12215RJ1aG+RFrOoGi0y/RQpWem31CTaRV2YIsygbmcXEMrjC/3Pg2j1SX +1Lg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:content-language:in-reply-to:mime-version :user-agent:date:message-id:references:cc:to:from:subject; bh=9F6ef4cFvk5x2wPwdZv2Dt7LgQ6qHYxcbLucF2Ex2Ag=; b=QWWBcpvMcUreHT7aK8es/c1uAEM/kyOYXG7GVAnLWk3oW//XboOuf4foAK3yXbJG8n XtT1AU1xAe4sohQoHW2nUVfSLfAdbYkhF5OUBG4bJ31PkzCr0jz9LxsfPTXaDTdp7d1K 34SnMprpSfYmz1aByBYEe5aBcaodClWf2brCGAt1kXr6h/QVbRgLCJrcBf1CanJPe6Wi 93sMwruX3ABfMGnu0/GWXvCfXNhogKoKNGAfkEfv7dzOzMt4Bnpie7SSXL6D01UqEqAx O75t1LH6gnh4iJ36Jz7gc7C5dPaYiWGjAggQZOvAOY9L/ugZYrb6qgaz0jYhulCfi85S hSDQ== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of claudius.heine.ext@siemens.com designates 192.35.17.28 as permitted sender) smtp.mailfrom=claudius.heine.ext@siemens.com Return-Path: Received: from goliath.siemens.de (goliath.siemens.de. [192.35.17.28]) by gmr-mx.google.com with ESMTPS id x188si1044183wmb.3.2019.02.07.03.36.16 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 07 Feb 2019 03:36:17 -0800 (PST) Received-SPF: pass (google.com: domain of claudius.heine.ext@siemens.com designates 192.35.17.28 as permitted sender) client-ip=192.35.17.28; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of claudius.heine.ext@siemens.com designates 192.35.17.28 as permitted sender) smtp.mailfrom=claudius.heine.ext@siemens.com Received: from mail1.sbs.de (mail1.sbs.de [192.129.41.35]) by goliath.siemens.de (8.15.2/8.15.2) with ESMTPS id x17BaGO9023180 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 7 Feb 2019 12:36:16 +0100 Received: from [139.25.69.181] (linux-ses-ext02.ppmd.siemens.net [139.25.69.181]) by mail1.sbs.de (8.15.2/8.15.2) with ESMTP id x17BaGnP021612; Thu, 7 Feb 2019 12:36:16 +0100 Subject: Re: [PATCH v2 1/1] meta: add isar-cfg-rootpw recipe for setting root password From: Claudius Heine To: isar-users@googlegroups.com Cc: Claudius Heine References: <20190207113512.3773-1-claudius.heine.ext@siemens.com> <20190207113512.3773-2-claudius.heine.ext@siemens.com> Message-ID: Date: Thu, 7 Feb 2019 12:36:16 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.4.0 MIME-Version: 1.0 In-Reply-To: <20190207113512.3773-2-claudius.heine.ext@siemens.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-TUID: Ugf+xDOa4ppp On 07/02/2019 12.35, [ext] claudius.heine.ext@siemens.com wrote: > From: Claudius Heine > > The isar-cfg-rootpw recipe is a central point to set the root password > for images. It provides the `CFG_ROOT_PW`, `CFG_ROOT_PW_ENC`, > `CFG_ROOT_LOCKED` and variables, that can be set from any `.conf` file > or via `isar-cfg-rootpw.bbappend`. Dammit, I will fix the description to remove CFG_ROOT_PW_ENC next :( > > This package is installed as a transient package to avoid leaking > passwords set by it via the scripts in `/var/lib/dpkg/info/`. > > The `CFG_ROOT_PW` and `CFG_ROOT_PW_ENC` variables contain either a root > password as clear text or encrypted, or are both empty, in which case > login without password is possible. The encrypted password is preferred > if both variables are set. > > The `CFG_ROOT_LOCKED` variable that can be set to "1" in order to lock > the root account, other values leave the account unlocked. Unlocking the > account at a later point will restore the password set by `CFG_ROOT_PW` > or `CFG_ROOT_PW_ENC`. > > Signed-off-by: Claudius Heine > --- > RECIPE-API-CHANGELOG.md | 9 +++++++++ > doc/user_manual.md | 2 ++ > meta-isar/conf/local.conf.sample | 6 ++++++ > .../recipes-app/example-raw/files/postinst | 4 ---- > meta/classes/isar-image.bbclass | 2 +- > .../isar-cfg-rootpw/files/postinst.tmpl | 19 +++++++++++++++++++ > .../isar-cfg-rootpw/isar-cfg-rootpw.bb | 19 +++++++++++++++++++ > 7 files changed, 56 insertions(+), 5 deletions(-) > create mode 100644 meta/recipes-support/isar-cfg-rootpw/files/postinst.tmpl > create mode 100644 meta/recipes-support/isar-cfg-rootpw/isar-cfg-rootpw.bb > > diff --git a/RECIPE-API-CHANGELOG.md b/RECIPE-API-CHANGELOG.md > index dcfbbee..197ce99 100644 > --- a/RECIPE-API-CHANGELOG.md > +++ b/RECIPE-API-CHANGELOG.md > @@ -136,3 +136,12 @@ files). Otherwise, default permissions are used. > > It's now sufficient to provide only kbuild rules. Makefile targets like modules > or modules_install as well as KDIR and DESTDIR evaluation are no longer needed. > + > +### Remove setting of root passwords in custom packages > + > +Custom packages that are not installed via the IMAGE_TRANSIENT_PACKAGES and set > +a root password, leak that password via its script in /var/lib/dpkg/info. > + > +Instead set the CFG_ROOT_PW variable to the encrypted password and use the > +transient 'isar-cfg-rootpw' package (now installed as transient package per > +default). > diff --git a/doc/user_manual.md b/doc/user_manual.md > index eebcaa9..dfd46ce 100644 > --- a/doc/user_manual.md > +++ b/doc/user_manual.md > @@ -313,6 +313,8 @@ Some other variables include: > - `HOST_ARCH` - The Debian architecture of SDK root filesystem (e.g., `amd64`). By default set to current Debian host architecture. This variable is optional. > - `HOST_DISTRO_APT_SOURCES` - List of apt source files for SDK root filesystem. This variable is optional. > - `HOST_DISTRO_APT_PREFERENCES` - List of apt preference files for SDK root filesystem. This variable is optional. > + - `CFG_ROOT_PW` - The encrypted root password to be set. To encrypt password use `mkpasswd`. You find `mkpasswd` in the `whois` package of Debian. If the variable is empty, root login requires not password > + - `CFG_ROOT_LOCKED` - If set to `1` the root account will be locked. > > --- > > diff --git a/meta-isar/conf/local.conf.sample b/meta-isar/conf/local.conf.sample > index a671b20..9bdfe10 100644 > --- a/meta-isar/conf/local.conf.sample > +++ b/meta-isar/conf/local.conf.sample > @@ -171,3 +171,9 @@ ISAR_CROSS_COMPILE ?= "0" > # > # Uncomment this to enable use of cached base repository > #ISAR_USE_CACHED_BASE_REPO ?= "1" > + > +# Set root password to 'root' > +# Password was encrypted using following command: > +# mkpasswd -m sha512crypt -R 10000 > +# mkpasswd is part of the 'whois' package of Debian > +CFG_ROOT_PW ?= "$6$rounds=10000$RXeWrnFmkY$DtuS/OmsAS2cCEDo0BF5qQsizIrq6jPgXnwv3PHqREJeKd1sXdHX/ayQtuQWVDHe0KIO0/sVH8dvQm1KthF0d/" > diff --git a/meta-isar/recipes-app/example-raw/files/postinst b/meta-isar/recipes-app/example-raw/files/postinst > index f60be8c..f48d993 100644 > --- a/meta-isar/recipes-app/example-raw/files/postinst > +++ b/meta-isar/recipes-app/example-raw/files/postinst > @@ -15,8 +15,4 @@ fi > > chown -R isar:isar /var/lib/isar > > -# this wins over meta-isar/recipes-core/images/files/*configscript.sh > -# but we take the same password for this example > -echo "root:root" | chpasswd > - > echo "isar" > /etc/hostname > diff --git a/meta/classes/isar-image.bbclass b/meta/classes/isar-image.bbclass > index e2bae58..cdd1651 100644 > --- a/meta/classes/isar-image.bbclass > +++ b/meta/classes/isar-image.bbclass > @@ -17,7 +17,7 @@ SRC_URI += "${@ cfg_script(d) }" > > DEPENDS += "${IMAGE_INSTALL} ${IMAGE_TRANSIENT_PACKAGES}" > > -IMAGE_TRANSIENT_PACKAGES += "isar-cfg-localepurge" > +IMAGE_TRANSIENT_PACKAGES += "isar-cfg-localepurge isar-cfg-rootpw" > > WORKDIR = "${TMPDIR}/work/${DISTRO}-${DISTRO_ARCH}/${PN}" > > diff --git a/meta/recipes-support/isar-cfg-rootpw/files/postinst.tmpl b/meta/recipes-support/isar-cfg-rootpw/files/postinst.tmpl > new file mode 100644 > index 0000000..ca08a41 > --- /dev/null > +++ b/meta/recipes-support/isar-cfg-rootpw/files/postinst.tmpl > @@ -0,0 +1,19 @@ > +#!/bin/sh > +set -e > + > +if ! grep -q 'root:\*:' /etc/shadow; then > + echo "ERROR:isar-cfg-rootpw: root password was set by a different package" >&2 > + exit -1 > +fi > + > +if [ -n '${CFG_ROOT_PW}' ]; then > + echo 'root:${CFG_ROOT_PW}' | chpasswd -e > +else > + passwd -d root > +fi > + > +if [ '${CFG_ROOT_LOCKED}' = "1" ]; then > + # Lock the account after setting the password, since unlocking it at some > + # point later would set it to the back to the previous one. > + passwd -l root > +fi > diff --git a/meta/recipes-support/isar-cfg-rootpw/isar-cfg-rootpw.bb b/meta/recipes-support/isar-cfg-rootpw/isar-cfg-rootpw.bb > new file mode 100644 > index 0000000..adee3b5 > --- /dev/null > +++ b/meta/recipes-support/isar-cfg-rootpw/isar-cfg-rootpw.bb > @@ -0,0 +1,19 @@ > +# This software is a part of ISAR. > + > +DESCRIPTION = "Isar configuration package for root password" > +MAINTAINER = "isar-users " > +DEBIAN_DEPENDS = "passwd" > + > +SRC_URI = "file://postinst.tmpl" > + > +TEMPLATE_FILES = "postinst.tmpl" > +TEMPLATE_VARS = "CFG_ROOT_PW CFG_ROOT_LOCKED" > + > +CFG_ROOT_PW ??= "" > +CFG_ROOT_LOCKED ??= "0" > + > +inherit dpkg-raw > + > +do_install() { > + echo "intentionally left blank" > +} > -- DENX Software Engineering GmbH, Managing Director: Wolfgang Denk HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany Phone: (+49)-8142-66989-54 Fax: (+49)-8142-66989-80 Email: ch@denx.de