tailscale/tailfs
Percy Wegmann 232a2d627c tailfs: only impersonate unprivileged user if able to sudo -u as that user
When serving TailFS shares, tailscaled executes another tailscaled to act as a
file server. It attempts to execute this child process as an unprivileged user
using sudo -u. This is important to avoid accessing files as root, which would
result in potential privilege escalation.

Previously, tailscaled assumed that it was running as someone who can sudo -u,
and would fail if it was unable to sudo -u.

With this commit, if tailscaled is unable to sudo -u as the requested user, and
tailscaled is not running as root, then tailscaled executes the the file server
process under the same identity that ran tailscaled, since this is already an
unprivileged identity.

In the unlikely event that tailscaled is running as root but is unable to
sudo -u, it will refuse to run the child file server process in order to avoid
privilege escalation.

Updates tailscale/corp#16827

Signed-off-by: Percy Wegmann <percy@tailscale.com>
2024-03-01 17:42:19 -06:00
..
tailfsimpl tailfs: only impersonate unprivileged user if able to sudo -u as that user 2024-03-01 17:42:19 -06:00
local.go tailfs: clean up naming and package structure 2024-02-09 20:00:42 -06:00
remote_nonunix.go tailfs: initial implementation 2024-02-09 09:13:51 -06:00
remote_permissions_test.go tailfs: initial implementation 2024-02-09 09:13:51 -06:00
remote_permissions.go tailfs: initial implementation 2024-02-09 09:13:51 -06:00
remote_unix.go tailfs: initial implementation 2024-02-09 09:13:51 -06:00
remote.go ipn: include full tailfs shares in ipn notifications 2024-02-29 10:16:44 -06:00