On Fri, Aug 08, 2008 at 03:47:39PM -0400, Glenn Brunette wrote:
> 
> 
> James Carlson wrote:
> > Garrett D'Amore writes:
> >> Reserved UIDs for this stuff is probably *not* the best solution.  Some 
> >> kind of ephemeral IDs, or a separate numbering space that is guaranteed 
> >> not to be used with non-local services would be best.   Since file 
> >> ownerships aren't at stake,
> > 
> > File ownerships are at stake, at least in the case that was originally
> > under discussion.  They were allocating yet another UID/GID
> > combination, running the daemon with those values, and installing the
> > database that way.
> > 
> > If file ownership really isn't at stake, then everyone can use a
> > single UID (such as the existing "noaccess" user), and the problem
> > goes away.
> 
> That is a non-starter for many of our customers who are looking for 
> unique credentials for each of their services -- especially those
> that may be running under the same OS instance/zone.  Not only does
> this help with accountability (syslog and audit) but having unique
> credentials will also help contain a compromise should one
> (unprivileged) service be exploited.  If you were running apache and
> mysql (for example) as the same UID, a flaw (w/arbitrary code execution)
> in one could lead to the direct compromise of the other running service.
> Taking away proc_session from each service could help with this however.

Lazy people (who, me?) are likely to be using user.project as well.

Ceri
-- 
That must be wonderful!  I don't understand it at all.
                                                  -- Moliere
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
URL: 
<http://mail.opensolaris.org/pipermail/opensolaris-arc/attachments/20080808/387cf118/attachment.bin>

Reply via email to