(Add suggestion to rename instead of delete) |
(Lets emphasis renaming over deletion) |
||
Line 88: | Line 88: | ||
Deletion is the toughest one to audit because it requires that we look through our systems looking for the UID and GID in addition to looking for the username and password. The UID and GID are used on things like filesystem permissions so we have to look there as well. Not catching these places may lead to security issus should the UID/GID ever be reused. | Deletion is the toughest one to audit because it requires that we look through our systems looking for the UID and GID in addition to looking for the username and password. The UID and GID are used on things like filesystem permissions so we have to look there as well. Not catching these places may lead to security issus should the UID/GID ever be reused. | ||
{{admon/note|Recommended to rename instead|When not strictly necessary to purge all traces of an account, it's recommended to rename the user or group to something like DELETED_oldusername instead of deleting. This avoids the problems and additional checking that we have to do below.}} | {{admon/note|Recommended to rename instead|When not strictly necessary to purge all traces of an account, it's '''highly'''recommended to rename the user or group to something like DELETED_oldusername instead of deleting. This avoids the problems and additional checking that we have to do below.}} | ||
=== Delete Accounts === | === Delete Accounts === |
Revision as of 17:47, 8 June 2011
For the most part we do not delete accounts. In the case that a deletion is paramount, it will need to be coordinated with appropriate entities.
Disabling accounts is another story but is limited to those with the appropriate privileges. Reasons for accounts to be disabled can be one of the following:
- Person has placed SPAM on the wiki or other sites.
- It is seen that the account has been compromised by a third party.
- A person wishes to leave the Fedora Project and wants the account disabled.
Disable
Disabling accounts is the easiest to accomplish as it just blocks people from using their account. It does not remove the account name and associated UID so we don't have to worry about future, unintentional collisions.
Disable Accounts
To begin with, accounts should not be disabled until there is a ticket in the Infrastructure ticketing system. After that the contents inside the ticket need to be verified (to make sure people aren't playing pranks or someone is in a crappy mood). This needs to be logged in the ticket (who looked, what they saw, etc). Then the account can be disabled.
ssh db02 sudo -u postgres pqsql fas2 fas2=# begin; fas2=# select * from people where username = 'FOOO';
Here you need to verify that the account looks right, that there is only one match, or other issues. If there are multiple matches you need to contact one of the main sysadmin-db's on how to proceed.
fas2=# update people set status = 'admin_disabled' where username = 'FOOO'; fas2=# commit; fas2=# /q
Disable Groups
There is no explicit way to disable groups in FAS2. Instead, we close the group for adding new members and optionally remove existing members from it.
This can be done from the web UI if you are an administrator of the group or you are in the accounts group. First, go to the group info page (ex: [[1]]). Then click the (edit)
link next to Group Details
. Make sure that the Invite Only
box is checked. This will prevent other users from requesting the group on their own.
If you want to remove the existing users, View the Group info, then click on the View Member List
link. Click on All
under the Results heading. Then go through and click on Remove
for each member.
Doing this in the database instead can be quicker if you have a lot of people to remove. Once again, this requires someone in sysadmin-db to do the work:
ssh db02 sudo -u postgres pqsql fas2 fas2=# begin; fas2=# update group, set invite_only = true where name = 'FOOO'; fas2=# commit; fas2=# begin; fas2=# select p.name, g.name, r.role_status from people as p, person_roles as r, groups as g where p.id = r.person_id and g.id = r.group_id and g.name = 'FOOO'; fas2=# -- Make sure that the list of users in the groups looks correct fas2=# delete from person_roles where person_roles.group_id = (select id from groups where g.name = 'FOOO'); fas2=# -- number of rows in both of the above should match fas2=# commit; fas2=# /q
Renames
In general, renames do not require as much work as deletions but they still require coordination. This is because renames do not change the UID/GID but some of our applications save information based on username/groupname rather than UID/GID.
Rename Accounts
- Check the databases for koji, pkgdb, and bodhi for occurrences of the old username and update them to the new username.
- Check fedorapeople.org for home directories and yum repositories under the old username that would need to be renamed
- Check (or ask the user to check and update) mailing list subscriptions on fedorahosted.org and lists.fedoraproject.org under the old username@fedoraproject.org email alias
- Check whether the user has a username@fedoraproject.org bugzilla account in python-fedora and update that. Also ask the user to update that in bugzilla.
- If the user is in a sysadmin-* group, check for home directories on bastion and other infrastructure boxes that are owned byt them and need to be renamed (Could also just tell the user to backup any files there themselves b/c they're getting a new home directory).
- grep through puppet for occurrences of the username
- Check for entries in trac on fedorahosted.org for the username as an "Assigned to" or "CC" entry.
- Add other places to check here
Rename Groups
- grep through puppet for occurrences of the group name.
- Check for group-members,group-admins,group-sponsors@fedoraproject.org email alias presence in any fedorahosted.org or lists.fedoraproject.org mailing list
- Check for entries in trac on fedorahosted.org for the username as an "Assigned to" or "CC" entry.
- Add other places to check here
Deletion
Deletion is the toughest one to audit because it requires that we look through our systems looking for the UID and GID in addition to looking for the username and password. The UID and GID are used on things like filesystem permissions so we have to look there as well. Not catching these places may lead to security issus should the UID/GID ever be reused.
Delete Accounts
- Check everything for the #Rename Accounts case.
- Figure out what boxes a user may have had access to in the past. This means you need to look at all the groups a user may ever have been approved for (even if they are not approved for those groups now). For instance, any git*, svn*, bzr*, hg* groups would have granted access to hosted01 and hosted02. packager would have granted access to pkgs.fedoraproject.org. Pretty much any group grants access to fedorapeople.org.
- For those boxes, run a find over the files there to see if the UID owns any files on the system.
# find / -uid 100068 -print
- Any files owned by that uid must be reassigned to another user or removed.
- Add other places to check here
Delete Groups
- Check everything for the #Rename Groups case.
- Figure out what boxes may have had files owned by that group. This means that you'd need to look at the users in that group, what boxes they have shell accounts on, and then look at those boxes. groups used for hosted would also need to add hosted01 and hosted02 to that list and the box that serves the hosted mailing lists.
- For those boxes, run a find over the files there to see if the GID owns any files on the system.
# find / -gid 100068 -print
- Any files owned by that GID must be reassigned to another group or removed.
- Add other places to check here