Gary Winiger wrote:
> Sorry, just catching up, so I may be repeating stuff already covered and
> I know I've gotten long winded.
> 
> Gary..
> ======
> First off, what seems to me to be necessary is a clear definition of
> the target use for the OpenSolaris live CD install.  It seems like it
> could range anywhere from the high school student on a $500 single user
> laptop to the multi-user enterprise customer in a highly secure environment
> (think banking where it's your personal $$ that will be lost).
> 
> IMO, they may have entirely different requirements.  What is the vetted
> requirements document for the project?
> 

The graphic installer on the live CD is oriented at desktop/laptop 
users.  The forthcoming text installer is oriented at server-class systems.

> Secondly, it seems to me a clear definition of the administrative model
> for OpenSolaris is needed.  This also could range from sudo/su root does
> everything to the administrative user is granted a set of authorizations
> and commands that let them setup just what can be done by whom without
> having to resort to running interactively with privilege.
> 
> IMO, they may be at different ends of the of the spectrum.  What is the
> vetted administrative model for OpenSolaris?  At one time I was told that
> Craig Payne was the Engineering manager in charge of defining the model.
> 

Some engagement there would be helpful.  I've heard little of that in 
the 2 years we've worked on building OpenSolaris releases.

Absent other engagement, the anticipated direction has been essentially 
what you refer to below as "MacOS X style".

Dave

> Without these two areas vetted, any suggestions may need significant
> adjustment.
> 
> Reading snippets from Greg Lavender and Bill Nesheim today:
> Greg:
>     Our job is to continue to advance Solaris as the market leading
>     enterprise OS, exploiting Sun hardware innovations, as well as create
>     innovative OS-based technologies that enable market winning integrated
>     software+hardware systems, such as the S7000 family of storage
>     appliances and other that are to be determined.
> 
> Bill:
>     I intend to call our new organization Solaris Platform Engineering.  I
>     believe that this is a very suitable name both in the sense that we
>     continue to be responsible for delivering low level support for Systems
>     group Platforms, and also in the sense that the Solaris OS releases we
>     deliver serve as a stable Platform for application deployment.   
> 
> I'm not sure if they are targeting S10, OpenSolaris, Solaris Next with
> their comments, but it would seem to me that the direction is more toward
> the multi-user enterprise than the single user laptop.  With that in mind,
> my suggestions for the installed OpenSolaris, Solaris Next system are:
>       1. /etc/default/login:PASSREQ=YES
>       2. The current Nevada enforcement for PASSREQ=YES continue unchanged
>       3. The installer require root to have a password -- see the
>          alternatives below.
>       4. An initial user account be generated which requires a password.
>          That account is granted the root role and no explicit Rights
>          Profiles.
>       5. That the user be given instructions how to set up a passwordless
>          "single user system" if they wish.
>       
>       That's pretty much how I manage my Solaris Boxes.
> 
> An alternative is the Mac OS X style -- not using Solaris RBAC features as
> the primary mechanism:
>       1 and 2 as above
>       3. Deliver root as a "no login" account.  (passwd -N equivalent)
>       4. An initial user account be generated which requires a password.
>          The initial account is given a user_attr(4) entry that grants the
>          "solaris.system.maintenance" authorization to the user.
>          (See PSARC/2008/321 No Root Login)
>       5. The initial account is granted sudo(1m) access.
> 
>       I've not looked closely under the covers of Mac OS X, but that's
> how it feels like Mac OS X works to me except Mac OS X does most things
> through GUIs that require administrative authentication.
> 
> And now my hoped for alternative which requires (and is aligned with) my
> hoped for vetted administrative model:
>       1 through 4 as directly above with slight modification that
>         the initial user is granted sufficient authorizations to configure
>         the system.
>       5. administer the system by authorization driven interfaces that
>          provide separation of duties rather than the administer running
>          a shell with privilege.


Reply via email to