summaryrefslogtreecommitdiffstats
path: root/modsign.cxx
diff options
context:
space:
mode:
authorDave Brolley <brolley@redhat.com>2009-11-12 10:23:59 -0500
committerDave Brolley <brolley@redhat.com>2009-11-12 10:23:59 -0500
commit3e6b1e441a3a9ac6d8232265caa358b4b6ad00bf (patch)
tree5d9af84059faaaacfc23e2513de21386bfc7c0a6 /modsign.cxx
parent56cfcfc6e4a93b62681926f6eb06339f4e38ac84 (diff)
downloadsystemtap-steved-3e6b1e441a3a9ac6d8232265caa358b4b6ad00bf.tar.gz
systemtap-steved-3e6b1e441a3a9ac6d8232265caa358b4b6ad00bf.tar.xz
systemtap-steved-3e6b1e441a3a9ac6d8232265caa358b4b6ad00bf.zip
Relax restrictions on ownership and access permissions of signer's cert database.
Diffstat (limited to 'modsign.cxx')
-rw-r--r--modsign.cxx7
1 files changed, 7 insertions, 0 deletions
diff --git a/modsign.cxx b/modsign.cxx
index a73386e3..1fc4ef32 100644
--- a/modsign.cxx
+++ b/modsign.cxx
@@ -69,6 +69,7 @@ check_cert_file_permissions (
rc = 1; // ok
+#if 0 // these checks are probably overkill
// We must be the owner of the file.
if (info.st_uid != euid)
{
@@ -111,6 +112,8 @@ check_cert_file_permissions (
cerr << "Certificate file " << cert_file << " must not be executable by others" << "." << endl;
rc = 0;
}
+#endif // these checks are probably overkill
+
return rc;
}
@@ -141,6 +144,7 @@ check_db_file_permissions (
rc = 1; // ok
+#if 0 // these checks are probably overkill
// We must be the owner of the file.
if (info.st_uid != euid)
{
@@ -189,6 +193,7 @@ check_db_file_permissions (
cerr << "Certificate database file " << cert_db_file << " must not be executable by others" << "." << endl;
rc = 0;
}
+#endif // these checks are probably overkill
return rc;
}
@@ -220,6 +225,7 @@ check_cert_db_permissions (const string &cert_db_path) {
// We must be the owner of the database.
euid = geteuid ();
pw = getpwuid (euid);
+#if 0 // these checks are probably overkill
if (! pw)
{
cerr << "Unable to obtain current user information which checking certificate database "
@@ -259,6 +265,7 @@ check_cert_db_permissions (const string &cert_db_path) {
}
if ((info.st_mode & S_IXOTH) == 0)
cerr << "Certificate database " << cert_db_path << " should be searchable by others" << "." << endl;
+#endif // these checks are probably overkill
// Now check the permissions of the critical files.
rc &= check_db_file_permissions (cert_db_path + "/cert8.db", euid, pw);