> * What could we gain by providing access to the system D-Bus in a 
> labeled zone ?
>    What would work that is useful that doesn't now ?
>    What new things could we do using D-Bus that would benefit labeled
>    zones ?
>    Are there existing things we could solve easier ?

Right the only system bus service is HAL, and HAL consumers on Solaris 
include:

- removable storage manager (gnome-volume-manager)
- printer autoconfiguration (project Presto)
- power management (battery applet, gnome-power-manager)
- libusb and libusb-based applications (PDA sync, PTP cameras, etc)

It does not mean, however, that making system bus available in zones 
would suddenly make all this functionality magically available to zones.

NetworkManager is also a system bus service, but it is not yet part of 
Solaris (and not clear if or when it will be).

> * What type of information is on the system D-Bus ?
>    How sensitive is that likely to be ?
>    Remember that we must be very careful about opening up
>    channels that could be used to communicate between labeled zones.

HAL broadcasts messages (signals) about devices being plugged and 
unplugged, which is not very sensitive, but sensitive enough that the 
Tamarack-on-Sun Ray effort has been stalled due to it. Ability to route 
signals only to certain users (or better, sessions) is not present in 
current DBus.

I suspect the information NetworkManager publishes on the bus is of 
comparable sensitivity.

Don't forget about method calls. DBus has pluggable authentication, but 
what's available now might not be sufficient. Also remember that in 
addition to session and system bus mode (over unix sockets), it also 
supports network mode (inet sockets) - which is not widely used, but 
something to consider wrt virtual environments.

If you let your imagination go, DBus can be used for all kinds of 
information. If DBus sounds too foreign to you, think of sysevents and 
doors. They are as generic and subject to similar risks to DBus.

> * Is access always read/write or would read only access be useful / 
> available ?

I think we would be getting ahead of ourselves if we tried to answer 
this now.

> * Would a trusted proxy be needed to filter what information can be 
> seen? [ I and Stephen both suspect so but lets not assume that is the 
> only solution ].

To a certain extent, the dbus-daemon itself is a proxy. Clients are not 
directly connected to services. dbus-daemon does authentication, routes 
messages, isolates connected clients from each other. It could, in 
theory, be made zone-aware, and run in "zone mode". Attempting to 
cascade two daemon instances and/or bridge two busses would be tricky 
and likely rejected by the DBus community (we tried that before). DBus 
is successful because of its simplicity and any intent to beef it up 
would be an uphill battle.

Are there easier ways to get what you want? That's a million dollar 
question. Especially considering where you started your inquiry, i.e. 
not exactly knowing what you want ;)

-Artem

Reply via email to