Hi Gary,

Thanks for looking at this - comments inline...


Gary Winiger wrote:
>> Rob's sent me updated materials which reflect the clarifications due 
>> to the conversation here around privileges and the removal of 
>> config/debug from the manpages.
>>
>> I've put them in the case directory.
> 
>> 4.11. Security Impact:
>>      During daemon initialization, the smtp-notify daemon will reduce its
>>      privileges to the following minimal set:
>>
>>      afsr# ppriv 104651
>>      104651: /usr/lib/fm/notify/smtp-notify
>>      flags = PRIV_AWARE
>>              E: basic,proc_setid
>>              I: basic,proc_setid
>>              P: basic,proc_setid
>>              L: basic,proc_setid
> 
>       The updated materials don't state what uid(s)/gid(s) the service runs
>       with.  If it starts with uid/gid 0 and changes it's uid/gid, what is
>       the new uid?

>       Note: proc_setid Allow a process to set its UIDs at will, assuming
>               UID 0 requires all privileges to be asserted.
>       Can this privilege reduction be done with a method context instead
>       of by the daemon?  If so, why isn't that the choice.  If not,
>       why not?


The daemon needs to start as uid/gid 0, because it needs to create/bind a
sysevent channel during initialization.  Afterward doing this, it reduces
it's privilege set to the minimal set noted above and changes its uid/gid
to user noaccess (60002).


>       Nit, I suspect there's a case dependency on PSARC/2009/617

Yes - correct.

thanks,

rob

Reply via email to