Mike Kupfer wrote:
The website Ops team noticed awhile back that the SCM loopback mounts[1]
were not going away as expected on the opensolaris.org servers.  We
eventually tracked this down to a change in behavior in sshd, such that
our PAM session-close code runs as the SCM user, not root[2].  Our
understanding is that we are unlikely to see the old behavior from sshd
any time soon.

After some discussion with the Ops team, I've been working on a
workaround.  The idea is to give users mount/unmount privileges by
putting this entry in /etc/user_attr:

<user>::::type=normal;defaultpriv=basic,sys_mount

This will let the session-close code run as the user.  We think this is
reasonably secure, in that any potential exploits would be limited to
inside the user's chroot environment.

That isn't a safe assumption, a chroot can be escaped from - which is why zones were invented.

Does this sound okay?

It sounds reasonable to me given the other protections you have in place.

--
Darren J Moffat
_______________________________________________
tools-discuss mailing list
tools-discuss@opensolaris.org

Reply via email to