On Sun, 27 Jul 2008, I wrote:

> 
> Hi all,
> 
> I've just been reading up on the peruser mpm. I like the idea because it 
> solves a real problem I'm having. I have a couple of questions, though. 
> As I understand it, apache listens on the network while running as root. 
> Is this not a security risk? Secondly, peruser MPM is not part of 
> upstream apache. What has prevented it from being merged?

I've a third question-- is anyone using SSL with peruser? The FAQ isn't 
very encouraging on that topic.

Has anyone looked at using filesystem capabilities to avoid the root 
daemon issue? It seems Linux 2.6.26 got a useable capabilities model (see
http://lwn.net/Articles/280279/

I think it would be possible to arrange to setuid/gid to an unprivileged 
user (e.g. httpd/httpd), as with standard apache.

The plan would be to drop all root privilege except for the CAP_SETUID, 
CAP_SETGID and CAP_SYS_CHROOT capabilities, which would be inherited by 
child processes. The child processes would permanently drop those 
capabilities as soon as peruser_setup_child() is finished with them.

CAP_SETUID still leaves the network daemon with more privilege than it 
needs, so then we just need a kernel patch that refuses to honour the 
CAP_SETUID/GID unless the requested setuid/gid is greater than the maximum 
system account uid/gid (which would probably have to be set with sysctl).

Does this make any sense?

Regards,
Finn Thain

_______________________________________________
Peruser mailing list
[email protected]
http://www.telana.com/mailman/listinfo/peruser

Reply via email to