On Thu, 13 Mar 2003, Andreas Aardal Hanssen wrote:

> On Wed, 12 Mar 2003, Charlie Brady wrote:
> >On Wed, 12 Mar 2003, Andreas Aardal Hanssen wrote:
> >> Hi, Charlie.
> >> By "invoked similarly" I mean that it is spawned through a tcp wrapper. It
> >> will support privilege seperation. But I am not convinced that the
> >> authenticator should spawn the daemon.
> >These last two statements appear to be contradictory. I think that the
> >authenticator must spawn the daemon to provide the privilege separation.
> 
> Not at all. checkpassword spawns something, but it doesn't have to be the
> daemon.

I wasn't meaning to imply that checkpassword should directly spawn the 
daemon. I would expect that checkpassword would spawn a chain of programs, 
one of which (probably the last) would be the daemon.

> I see the advantages of using checkpassword with pipelining
> commands such as the smtp-after-imap stuff and so on.

Exactly.

> But this works today by throwing in programs in checkpassword's
> pipeline.

Sure, but those programs can't control the daemon's execution environment,
the daemon is left with too much privilege, and you have needed to supply
lots of glue code.

--
Charlie

Reply via email to