Tony Nguyen writes:
> Tom Whitten wrote:
> > Tony Nguyen writes:
> >   
> >> A quick poll here to get input from folks. The background for this is in
> >>
> >> 6834760 svcadm shouldn't assert() when not enough privileges
> >>
> >> In summary, since the integration of 6762307, user needs both 
> >> solaris.smf.modify and solaris.smf.manage to run svcadm enable/disable 
> >> which is a regression to the policy in smf_security(5).
> >>
> >> In the evaluation of 6834760, I listed a couple possible solutions. A 
> >> chat with Liane convinced me the most reasonable solution is to expand 
> >> the privilege for solaris.smf.modify, making it a superset of 
> >> solaris.smf.manage. In other words, users with solaris.smf.modify will 
> >> be able to perform service actions granted to solaris.smf.manage (e.g. 
> >> refresh/restart/clear/mark). At the moment, the differences between 
> >> privileges granted to the mentioned authorizations are blurry and 
> >> perhaps inconsistent:
> >>
> >> - Currently, users with smf.modify can fake restart and clear actions by 
> >> disabling then enabling services.
> >>
> >> - solaris.smf.modify also allows service/instance/property modifications 
> >> but doesn't allow service refresh. So users with smf.modify 
> >> authorization cannot fully modify configurations.
> >>
> >> Making solaris.smf.modify to have privileges granted to 
> >> solaris.smf.manage allows users to properly perform restart/clear 
> >> actions and correctly make changes to configuration. The proposed 
> >> solution also implied allowing users with solaris.smf.modify 
> >> authorization to do svcadm mark.
> >>
> >> Feedback/comments are appreciated before I start looking at configd code.
> >>
> >> cheers,
> >> -tony
> >> _______________________________________________
> >> smf-discuss mailing list
> >> smf-discuss at opensolaris.org
> >>     
> >
> > The idea of making smf.modify a superset of smf.manage makes sense to me.
> > smf.modify allows the user to add, delete, or modify  services, etc.  If
> > you can add or delete a service, it seems logical that you should also be
> > allowed to enable it.
> >
> >   
> Tom,
> 
> User with smf.modify actually can enable/disable services today. Indeed, 
> it's logical that user who can modify, enable, disable and clear and 
> restart through workarounds, be able to perform those actions through 
> official svcadm subcommands.
> 
> -tony

I guess I'm a little slow today.  If a user with smf.modify can
enable/disable services, why is it necessary to make smf.modify a
superset of smf.manage?

tom

Reply via email to