"One could easily poke holes in this complaint; the characterization
of PAM as "modern" is somewhat amusing; it is 1990s technology."

Dafuk.  If he's going to nitpick, then so am I.  Marc did not say PAM
was modern.  He mentioned a modern Linux distro with pulseaudio, pam
and systemd - to infer that he therefore considers PAM to be modern is
a straw man argument at best.

"in the early 1990s, BSD-oriented developers were equally unconcerned
about the difficulty of porting their code to Linux."

In the early 1990s, Linux was a dinky little toy, far from the
ubiquitous platform it has become.  The straw man rears its grassy
head again.

At least he recognises that a Linux monoculture would be just as
damaging as the current arrangement.

On Sat, Nov 17, 2012 at 7:57 PM, Andres Perera <andre...@zoho.com> wrote:
> On Sat, Nov 17, 2012 at 3:20 AM, Eric Furman <ericfur...@fastmail.net> wrote:
>> You missed the point.
>> This is a joke.
>> Rod was making a joke by pointing out how F****** retarded these people
>> are.
>
> i'm going to pretend that you pointed out that cgroups prevent
> double-forking from being a factor whereas pgroups do not
>
> this is a question of policy, not api:
>
> 1. if a program double-forks, that program has made it clear that it
> does not need the destructors scripted in "systemd implementation",
> and is eligible for being terminated by the generic, all-encompasing,
> sysv killall(), linux killall5, or bsd kill(-1) at the end of
> shutdown. this conclusion is drawn by the fact that the program can
> negate scripted destructors ANYWAY under cgroups by way of being
> unrestricted in its set of system calls (which is a concern OUTSIDE
> "systemd implementation", therefore the role of a more generic
> utility), or by plain bat shit insane userland code. there's no
> sandbox being added by cgroups here
>
> 2. if a program double-forks, security is not compromised because the
> permissions of that program are completely orthogonal to control via
> "systemd implementation". the admin's *policy* is that there's always
> an interest in running certain daemons as certain users. that "systemd
> implementation" can also map processes to users is coincidental
>
> therefore the requirement for cgroups is completely arbitrary
>
> also of interest:
>
> * early versions of systemd documentation advised daemon authors not
> to double fork. presumably cgroups wasn't in the radar at the time
>
> * several (all?) openbsd daemons have options for not double-forking.
> some of these daemons have the gall of preceding systemd
>
>>
>> On Sat, Nov 17, 2012, at 02:21 AM, Andres Perera wrote:
>>> On Sat, Nov 17, 2012 at 1:55 AM, Rod Whitworth <glis...@witworx.com>
>>> wrote:
>>> > On Fri, 16 Nov 2012 20:49:37 -0600, Amit Kulkarni wrote:
>>> >
>>> >>https://lwn.net/Articles/524606/
>>> >>
>>> >>don't have a subscription but for those who do, enjoy.
>>> >>
>>> >
>>> > But http://lwn.net/Articles/524920/ will give you the idea without $$$
>>>
>>> "rleigh, it's really not as easy as you think. Making the event loop
>>> portable to kqueue is complex, but doable, I can agree to that. -- But
>>> the trouble starts beyond that. The BSDs don't have anything like
>>> cgroups. *There's no way to attach a name to a group of processes, in
>>> a hierarchal, secure way*. And you cannot emulate this. (And no, don't
>>> say "BSD jail" now, because that is something very different). But
>>> this already is at the very core of systemd. It's how systemd tracks
>>> services."
>>>
>>> how can someone write this and not explain why a process managing
>>> pgroups can't achieve the same results?
>>>
>>> pgroups is going to be the first alternative for someone instinctively
>>> looking for a portable alternative, so i'm genuinely interested in
>>> knowing why they've discarded the idea
>>>
>>> i am, however, aware of differences *unrelated* to writing a systemd
>>> like appliance. pgroups do not provide per item hostname and other
>>> virtualization facilities in freebsd jails/linux cgroups, but what
>>> about *relevant* differences? something weak like "the index for for
>>> cgroups is wide enough to fit an UUID"? in other words, something that
>>> *doesn't* require a completely new api?
>



-- 
Aaron Mason - Programmer, open source addict
I've taken my software vows - for beta or for worse

Reply via email to