Chris Josephes wrote:
>> *I think this is a question of fully utilizing SMF security features,
>> along with potentially maintaining patches to some of the open source
>> code to bypass their own cross-platform security implementation, and
>> needing to help users understand why our delivery of a familiar server
>> is supposed to operate differently than they are accustomed.
> 
> I think there's something that requires clarification here.
> 
> Nothing that I originally proposed requires changing the source code, 
> maintaining a fork, or contributing patches to the Danga memcache code.  It 
> was only a proposed change to the manifest file and method script.  And from 
> what I can tell, those 2 files aren't even shipped and distrbuted by Danga.
> 
> For example, I could download the current memcache distribution, replace 
> those two files myself and it would still work perfectly.
> 
>> This same question* could apply to just about any of the Web Stack
>> features. It should be obvious why SMF is used (friendlier than generic
>> SysV init, supports some level of customization of the service without
>> the user having to edit files, etc.)
> 
> Okay, it's obvious why SMF is used.  What isn't obvious is why an established 
> convention that other third party applications work fine with is considered 
> taboo for Memcache.

I guess that is a question for the person who originally wrote the SMF 
for memcached. I would _guess_ that they did it to be end-user-friendly.

It is much easier to say:
* "set the options you want to enable on memcached in this SMF property 
and restart the service"

Than:
* If you want to listen to a privileged port (link to a definition of a 
privileged port) you have to give the service the following set of 
privileges
* If you want memcached to lock it's pages into memory you have to give 
the service the following privilege
* If you for some reason want to run memcached as this special user, 
don't follow the method google told you, on Solaris you need to do this 
by changing the creds..

The method we use here is the same method you'll find on pretty much all 
of the linux variants out there, so it really can't be that bad. And as 
I also said in another message: memcached is by design insecure and you 
should therefore _only_ run it in your private and secure network.

If this is a really big problem for you I suggest that you create a bug 
report on the issue and use your support contract to escalate it.

Cheers,

Trond


Reply via email to