>I'm assuming here that pfexecd is running as root with all privileges ?
>Or is it able to run with a reduced set (for example pfexecd shouldn't I 
>think need most of the current basic privs or file_write from the new 
>set in PSARC/2009/378).  Though it feels to me like it should be running 
>with all privs because other wise a lower privileged process is acting 
>as an authority to hand out privs it doesn't actually have.

Yes, correct.

>Sorry for not bringing this next one up in the prereview but it only 
>just popped into my head.   In the current system pfexec itself will do 
>the nameservice lookup to find the exec_attr entry to use.  If I 
>understand the new system it will be pfexecd doing that, right ?   So 
>this changes things with respect to per user nscd (needed for doing self 
>credential'd lookups) in that user_attr, prof_attr and exec_attr lookups 
>for 'pfexec' won't use the per user nscd ?   Or am I missing something.

Right.  So where's the per-user nscd case?

>In the pre-review we discussed wither or not a TX configuration would 
>have one pfexecd per system (in the global zone) or one per zone.  This 
>would ensure that pfexecd "follows" what happens with nscd which can be 
>one in the global zone or one per zone.  I can't tell from the case 
>material what the decision was on that.

There's apparently one nscd per TX system and it makes sense there's
only one pfexecd in that schema.

Casper


Reply via email to