On Thu, Jun 22, 2006 at 11:55:05AM +0200, [EMAIL PROTECTED] wrote:
> >Yes.  It's kind of enticing.
> 
> I'm not entirely clear as to the problem which it solves; I think
> I'd much rather have a user which cannot modify anything.

The "canonical" example would be, I think, ssh-agent(1), although I'm
not sure it's safe to drop basic privileges given the possibility of it
using complex crypto frameworks (currently it uses OpenSSL, but through
it it could use PKCS#11).

A user that cannot modify anything, not even temp files made by them,
seems much too narrowly constrained.

> As I understand the proposal, you can still read/modify world
> accessible files.

Yes.

> >As I interpret the proposal file creation in /tmp would succeed, but
> >opening existing files owned by the process' actual euid cannot be
> >opened if thes basic privs are dropped.
> 
> Right; but often programs work by reopening such files; that will now
> fail.

It could be made to work...

Another concern would be: what UID owns files created by such processes?

> >How would dropping this basic priv work with NFS though?
> 
> Not until we make privileges visible over NFS which is a tough nut
> to crack.

For non-basic privs we can always do things with the client's root
credential and, when creating files, use the create_as option in NFSv4.
Then the client could emulate FILE_DAC_*.

For basic privs it's harder; if the client had a "nobody" credential
then it could use that.

The general solution to the NFS problem with privileges is, IMO, as I
outlined earlier, through the GSS-API.
_______________________________________________
zfs-discuss mailing list
zfs-discuss@opensolaris.org
http://mail.opensolaris.org/mailman/listinfo/zfs-discuss

Reply via email to