[EMAIL PROTECTED] wrote:

* Lots of system daemons do chdir("/") as part of their startup. If they use libraries that try and read config files from the users home dir then they can end up reading the ones for the root user, that might not be desirable.

Please name one example; I think you're just making this up. Are you suggesting that libraries exist which read config files from the current
directory?

Badly phrased rather than making it up. This actually has nothing to do with the current working directory (so the chdir("/" is bogus - sorry I was doing too many things at once).

Things running as daemon often do a chdir("/"), but the important bit is the home directory of daemon is ? "/" the same as root.

~/.ssh for root and daemon resolve to the same place.

~/.sunw/pkcs11_softtoken/ - which is an encrypted keystore resolve to the same place.

Now proper default permissions ensure there isn't a security problem here but it means that root and daemon can't have separate configurations for these things. For the pkcs11_softtoken case it actually means that for the daemon user by default their can't be a persistent keystore because root already staked out that namespace.

* because the root user can have personal config files and the existence of those files should not be available to unprivileged users, or for tidyness.

* consistency with other systems

* because we can and there is no downside to doing so

I'm sure there's stuff which breaks because ~root no longer expands to
/

Yes there probably is but that code would be broken on other systems that do this as well!

BTW the PSARC case for this is already approved, it just hasn't been implemented for this exact reason. There are Solaris test suites that are known to break because of assumptions like this.

--
Darren J Moffat
_______________________________________________
opensolaris-discuss mailing list
[email protected]

Reply via email to