> On Mon, Mar 19, 2007 at 08:56:07AM -0800, Gary Winiger wrote:

        In general my points were to have the document that goes to
        ARC review updated to reflect the answers to questions I would
        have raised if this had been the review.

        IMO, a good fast track is one with no discussion.

> > > 2.1.1. Definition
> > > 
> > >    The read_authorization property may optionally be added to any
> > >    property group of type application (SCF_GROUP_APPLICATION).  It is
> > 
> >     Why should it be restricted to only application PGs at this time?
> >     What's the drawback of being general?

> sensitive; I don't see a benefit that would justify the amount of
> complexity that would introduce.

        Seems reasonable to expand and give the rationale.

> > > 2.3. svcprop(1) changes
> > 
> > >    - If no property or property group was specified, properties for
> > >      which the user lacks appropriate authorization to read will be
> > >      displayed as if they had zero values.
> > 
> >     Are string values the empty string?
> 
> All properties with no values show up as the empty string; i.e.,

> So yes.

        Just saying zero values is incomplete, adding empty string

> > >    To provide the ability to export documents containing the values of
> > >    sensitive properties, we introduce 'svccfg exportall'.  This command
> > >    behaves identically to 'export', except that the values of properties 
> > > in
> > >    SPGs are exported if the user has sufficient authorization to read 
> > > them.
> > >    Otherwise, the command terminates and displays an appropriate error
> > >    message.
> > 
> >     Does it terminate at the first SPG, or will it always terminated
> >     just in case there may be an SPG in the repository even if there
> >     are none?
> 
> It will abort only if an SPG is encountered for which the user does
> not have sufficient authorization to read its contents.

        Good to say so.

> >     How does the repository protect sensitive values from view?

> implementation details, though; I can provide a webrev in a couple of
> days if you want the nitty-gritty.

        I was actually thinking of something much simpler.  I'd not recalled
        the permissions on the repository.  The repository is protected
        from public read access.

> >     What requirements does this place on remote repositories?
> 
> Since the interface between svc.configd and a remote backend is not

> to do so on the affected hosts).  This change requires the same
> capability with respect to reads.  The most likely future networked
> backend, LDAP, already offers this capability.

        Greenline itself did lay out the intention for remotly served
        repositories.
        Is is really LDAP (which is a protocol), or is it the directory
        server implementation(s) that provide for different access control
        policies?

> >     Have the NSS2/Sparks folk been included in any new remote
> >     repository requirement?
> 
> I don't see anything in the Sparks (nor Duckwater) materials to
> suggest that they're considering implementing networked backends for
> SMF.  If I've overlooked something here, please let me know.

        Right there may be nothing in the current materials.  The broader
        perspective is that the repository can be centrally served.  NSS2
        is the umbrella that would likely provide that service.  Until
        this case, there were no requirements to protect anything beyond
        update protections.  IMO, that allows a lot of flexability in the
        schema -- not being a directory server (or access protocol) expert,
        it seems reasonable to me to suggest a discussion with NSS2 so
        they can possibly provide input that is relevant to this case.

        Recall Greenline made such statements as, gww's paraphrase,
        privacy of values was outside the scope, but could be done with
        encryption if needed and it was incumbant on the service to provide
        whatever was needed.  This case changes that architecture.
        Consulting with other project teams that might be affected seems
        reasonable.

Gary..

Reply via email to