On 06/15/09 09:10, Sangeeta Misra wrote:
> Folks,
> Currently ilbd daemon  runs as "root" and uses SCF to store 
> persistent  configuration.  ILB's rules, servergroups and healthcheck 
> objects are  represented as property groups in SCF.  Note that we use 
> the property group type SCF_GROUP_APPLICATION.
>
> Below is a sample layout of the ilb property groups/properties:
>
> prop-group name | property name | property type  | property value
> -------------------------------------------------------------------------
> rule123           status          boolean          disabled/enabled
>                  vip             net-v4/6-addr    v4/6 IP address
>                  port            astring          port range
>                  protocol        astring          TCP/UDP...
>                  ilb-alg         astring          round-robin...
>                  ilb-type        astring          NAT/DSR...
>                  healthcheck     astring          healthcheck name
>                  drain-time      int              sec
>                  nat-timeout     int              sec
>                  pers-timeout    int              sec
>                  hc-port         astring          ALL/ANY/some-number
>                  servergroup     astring          servergroup name
>                  [.... more rules ....]
> servergroup123    status          boolean          disabled/enabled
>                  server1         astring          
> IP-addr:port:enable/disable
>                  server2         astring          
> IP-addr:port:enable/disable
>                  [ .... more servers ....]
> healthcheck123    hc-test         astring          test program
>                  hc-timeout      int              timeout value in sec
>                  hc-interval     int              interval val in sec
>                  hc-count        int              test repetition
>                  [ .... more healthchecks ....]
>
> I am trying to see if I can get ilbd to run as "daemon"  instead of 
> "root" .  See attached ilbd.xml file to see the list of privileges 
> that ilbd daemon runs with.  After starting the ilbd daemon ( ie 
> running with "daemon" uid), when I try to configure healthcheck thus:
>
> # ilbadm create-healthcheck -h 
> hc-test=ping,hc-timeout=3,hc-count=2,hc-interval=14 hc1
>
> I get the error:
> ilbadm: no scf permit
>
> The command executes fine, but its the writing  to scf  that is 
> failing.  My questions are as follows:
>
> Question 1
> ===========
> I assume in order to authorize ilbd daemon to successfully call the 
> the scf_* functions to create/modify /delete/retrieve the 
> configuration  to/from scf framework, all I need to do is add this to  
> usr/src/lib/libsecdb/user_attr.txt :
>
> daemon::::auths=solaris.smf.manage.ilb,solaris.smf.modify 
>
> Can you confirm that this is indeed all that is  required?  Or does 
> one need to do more than that  ( and if so what exactly)?
>
I tried the above and it seems to work. But the question is is this OK 
to do.  If not ,  then we would need to create a uid of  "netadm" and 
run ilbd with that uid instead and change the user_attr entry to:
 
netadm::::auths=solaris.smf.manage.ilb,solaris.smf.modify 

Please advise.

Sangeeta
> Question 2
> =============
> Is it OK for a process  running as "daemon" to have  
> "solaris.smf.modify"/"solaris.smf.modify.application" authorization? 
> Or should this authorization  only be granted to processes that run as 
> "root" ?
>
> Sangeeta
>
> ------------------------------------------------------------------------
>
> _______________________________________________
> ilb-dev mailing list
> ilb-dev at opensolaris.org
> http://mail.opensolaris.org/mailman/listinfo/ilb-dev

-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
<http://mail.opensolaris.org/pipermail/smf-discuss/attachments/20090615/399c2beb/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: ilbd.xml
Type: text/xml
Size: 3171 bytes
Desc: not available
URL: 
<http://mail.opensolaris.org/pipermail/smf-discuss/attachments/20090615/399c2beb/attachment.xml>

Reply via email to