On Tue, March 2, 2010 15:12, Paul B. Henson wrote:
> On Tue, 2 Mar 2010, David Dyer-Bennet wrote:
>
>> Hmmm; the "lack of flexibility" you talk about comes from not using the
>> security model sensibly -- having per-person groups is very useful in
>> that security model.
>
> I have 70 odd thousand users. Why would I want to also have 70 thousand
> groups with only one user in each one? From an authorization perspective,
> the user and group are identical. The absolute only reason to implement
> such a duplicative environment is so you can have one umask, but still be
> able to control whether or not someone other than the user gets
> permissions
> on new files. In a world with inheritable ACL's, you don't need to do
> that.

It's the normal way to do it; not sure where in the Linux world it arose,
but I first saw it in some early distribution.  It's done automatically by
"adduser".   In my perception, it's "best practice".  So the question is,
why do you NOT want to do it?

>> You see it as a "legacy security model"; but for me it's the primary
>> security model, with ACLs as an add-on.  It's the only one that's
>> supported across the various ways of sharing the disks. In the end,
>> Solaris is one player in the POSIX world, and cutting yourself off from
>> that would be very limiting.
>
> If the design requirements of your filesystem require backward
> interoperability, then yes. On the other hand, if they don't, and you
> would
> be better served with a pure-ACL deployment, why hold yourself down with
> the chains of a security model you don't need?

I can't believe in that model.  If I buy it, every time I consider a
script set or application for use, I have to do extensive testing to
verify that it works in the model.  And I have to deal with users having
that problem on their own.  This is far, far too expensive to give any
serious consideration to.

This is why people hate flag-day changes.

>> It's precisely to avoid having shell access being a poor stepchild that
>> I'm resisting ACLs.  As currently implemented, they relegate my primary
>> access to the system to second-class status.
>
> How so? Do you mean operating in a shell on a system with no ACL support?

The command-line interface to ACLs is confusing, possibly weak.

>> And NFSv4 is mostly a rumor in my universe; NFSv2 and v3 are what people
>> actually use.
>
> Really? We've deployed NFSv4 here, and other than this ACL/chmod issue
> it's
> working great. I think I'd rather design my future technology based on the
> needs and possibilities of the future, not on the past. From that
> perspective, why should Sun bother to work on NFSv4 at all if nobody uses
> it.

Generally you have to work on things for a while before they get
widespread adoption, especially by outside implementers.  It's entirely
possible that NFS V4 will be widely used, but from what I read on linux
sysadmin forums, it isn't yet.

> Again, I'm not advocating removing any current functionality or depriving
> you of anything you currently have. I'm simply requesting an additional
> feature set that would be very useful for some deployments. I'm not really
> sure why people keep arguing about why it would not be good for their
> deployment, and considering such a reason it should not be implemented --
> that seems a bit self-centered.

When a tool is there, people will want to use it.  When using it causes me
endless trouble, I don't want them to use it.

We're all arguing for what will work best for us, I think; selfish, but I
hope in the "sanely selfish" region.
-- 
David Dyer-Bennet, d...@dd-b.net; http://dd-b.net/
Snapshots: http://dd-b.net/dd-b/SnapshotAlbum/data/
Photos: http://dd-b.net/photography/gallery/
Dragaera: http://dragaera.info

_______________________________________________
zfs-discuss mailing list
zfs-discuss@opensolaris.org
http://mail.opensolaris.org/mailman/listinfo/zfs-discuss

Reply via email to