>The method we use here is the same method you'll find on pretty much all
>of the linux variants out there, so it really can't be that bad. And as
>I also said in another message: memcached is by design insecure and you
>should therefore _only_ run it in your private and secure network.


Consider this scenario.

An OpenSolaris host has a Systems Administrator, who can do everything.  It 
also has a Database/Memcache administrator that does not know the root 
password, but has privileges through RBAC to control the services he/she needs 
to administer.  Part of those authorizations are supplied from your manifest in 
the forms of "solaris.smf.manage.memcached" and "solaris.smf.value.memcached".

So, the database administrator can set the "-m" option, or the "-p" option or 
whatever, or they can change the user through the "-u" option.

When SMF starts memcache, by defaut it starts it as root.  Then, because of 
your default "-u noaccess" option, Memcache changes its effective ID to 
"noaccess".

But if the database administrator changes memcached/options to "-u root", then 
the command line becomes:

$ memcached -u noaccess -u root

Guess what happens?  Memcache runs as root.  So a user that never had root 
access now has control over a program running as root.  Memcache doesn't write 
out any files, and it doesn't read any files, but I'd think you understand 
where my logic is heading.

But with a <method_context> block, memcache never has the opportunities 
to have root privileges.
-- 
This message posted from opensolaris.org

Reply via email to