On Tue, Mar 20, 2007 at 09:52:53PM -0700, David Bustos wrote:

>   "The read_authorization property...": I presume you're not planning on
>     stopping anyone from creating read_authorization properties in
>     non-application property groups.  Perhaps it would be better to talk
>     about how that property will be interpreted in those property
>     groups.

I've adjusted this language to make it clear that this property will
be interpreted as described for all group types except the three noted
(framework, dependency, method).

>   "It is defined...": Similarly, I presume you're not planning on
>     stopping anyone from creating read_authorization properties with
>     types other than "astring".  You should probably say that such
>     properties will be ignored.

Nothing here will prevent anyone from creating anything.  I'll note
explicitly that non-astring read_authorization properties will be
ignored.

>   "Each string value...": Similarly, defining the values to be RBAC
>     authorizations won't make them authorizations.  You should probably
>     say that they will be interpreted as RBAC authorizations.

Ok.

>   - Is it too pedantic to worry about applications or users who are
>     already using properties named "read_authorization"?

I think so.  I'm not aware of any service using this property, and the
similarity of its name to existing reserved names should have
discouraged anyone from doing so.  It would have been better to have
reserved a part of the property namespace, but this was not done.

> 2.1.2. svc.configd(1M) RPC changes
> 
>   "If the requesting client would be permitted...": I presume that "to
>     modify" includes value modification, as in the value_authorization
>     sense?

Yes.  It means exactly what it says: if you can change the value, you
can read it.  It does not matter how you obtain the right to change
it.

>   - Shouldn't the read_authorization property itself be world-readable
>     so that software can determine whether permission was denied becasue
>     of it?  Similarly for action_, modify_, and value_authorization.

No.  Knowledge of the authorization required to perform an action is
potentially valuable information.  Attacking a system is not an
adventure game; we don't say "you need the blue key to open this
door" to encourage the player to go find the right one.

(I'll note that the existing implementation exposes the values of the
authorization properties.  Correcting this is outside the scope of
this case, which provides only for per-group granularity.)

>   - Will read_authorization's of service property groups be inherited by
>     instance property groups?

Yes.

>   - When the client is reading from a snapshot, will the snapshot's
>     read_authorization be used, or the instance's current value?

The snapshot.  The authorization and the sensitive information
required to obtain it go together.

> 2.3. svcprop(1) changes
> 
>   "the present behaviour...": I think you should clarify this, since
>     svcprop displays different things for a property with no values and
>     a property with a single value which is the empty string.

The change I made here was at gww's recommendation.  I too felt the
original language was clearer.  Do either of you have suggestions for
alternate language?

> 2.4.1. export changes, introduction of export -a
> 
>   "'svccfg export' is modified...": Will the values of
>     read_authorization also be omitted?

Yes.  The effect applies to the entire property group, always.

> 4.1. Guidance
> 
>   - It seems that you have changed the period at the end of
>     "solaris.smf.{manage, modify, value}." to a comma.  I suspect that's
>     incorrect, because I believe the punctuation was not for English
>     syntactic reasons, but because we intend for the service author to
>     use these strings as a prefix on his service-specific
>     authorizations.  Perhaps you should clarify this by making the
>     string "solaris.smf.{manage, modify, value, read}.<token>" or some
>     such.

Yes, that's an error.  I'll correct it.

-- 
Keith M Wesolowski              "Sir, we're surrounded!" 
FishWorks                       "Excellent; we can attack in any direction!" 

Reply via email to