Am 11.10.2010 18:11, Anders Blomdell wrote:
> We are planning to extend our use of xenomai to a wider audience at our
> department, and therefore I would like to know which is the better way to let
> users run xenomai programs with a minimum of system privileges, the
> possibilities I can see are:
> 
> 1. Let the user run anything as root; simple but obviously a security 
> nightmare.
> 2. Write a suid program that let's its children inherit the right capabilities
> and then does a seteuid and does an execve; unfortunately this implies that 
> the
> program that is execve'd has the right capabilties set [which has to be done 
> by
> the suid program as well], and this can only be done on filesystems that can
> have extended attributes (i.e. no FAT, NFS, etc).
> 3. Write a suid program that drops all unneeded privileges and then use dlopen
> and friends to execute the user code.
> 
> I guess that there exists better ways, so somebody please enlighten me.
> 

A bit better, but not perfect:

http://www.xenomai.org/index.php/Non-root_RT

Combining this with mediated hardware access (robust drivers) and
enabling the Xenomai watchdog should provide a reasonably safe&secure
environment.

Jan


-- 
Siemens AG, Corporate Technology, CT T DE IT 1
Corporate Competence Center Embedded Linux

_______________________________________________
Xenomai-help mailing list
[email protected]
https://mail.gna.org/listinfo/xenomai-help

Reply via email to