James Carlson wrote:
> I think the question was whether "fakeroot" could provide the
> application with an environment in which the application 'thought' that
> it had some set of privileges, even though it didn't.
> 
> It's a logical extension of "fakeroot" into the Solaris architecture.
> Because of Least Privilege, there's not really the "all powerful root"
> on Solaris as there is on other platforms.  The current "fakeroot"
> emulates that old-school all-powerful root by creating an environment
> for the application where it appears as though all privileges were granted.

Actually, if I understood the man page correctly, it sounds like 
fakeroot today emulates a subset of the traditional root powers. It's 
approximately equivalent to a process with various file_* privileges. 
Something like "fakefileprivs" might be a more accurate name, but it's 
too cumbersome. :-)

Of course, the set of privileges it emulates is fixed. Danek was asking 
whether it could/should be extended to allow the set to be specified.

        Scott


-- 
Scott Rotondo
Principal Engineer, Solaris Security Technologies
President, Trusted Computing Group
Phone/FAX: +1 408 850 3655 (Internal x68278)

Reply via email to