On (29/11/16 10:01), Lukas Slebodnik wrote:
>On (28/11/16 11:27), Jakub Hrozek wrote:
>>On Mon, Nov 28, 2016 at 10:57:44AM +0100, Pavel Březina wrote:
>>> On 11/28/2016 10:47 AM, Jakub Hrozek wrote:
>>> > On Thu, Nov 24, 2016 at 02:33:04PM +0100, Fabiano Fidêncio wrote:
>>> > > The design page is done [0] and it's based on this discussion [1] we
>>> > > had on this very same mailing list. A pull-request with the
>>> > > implementation is already opened [2].
>>> > > 
>>> > > [0]: 
>>> > > https://fedorahosted.org/sssd/wiki/DesignDocs/SocketActivatableResponders
>>> > > [1]: 
>>> > > https://lists.fedorahosted.org/archives/list/sssd-devel@lists.fedorahosted.org/message/H6JOF5SGGSIJUIWYNANDA73ODHWBS7J2/
>>> > > [2]: https://github.com/SSSD/sssd/pull/84
>>> > > 
>>> > > The full text of c&p here:
>>> > 
>>> > In general looks good to me, but note that I was involved a bit with
>>> > Fabiano in the discussion, so my view might be tainted.
>>> 
>>> I finally got to it. The design page looks good and I'll start reviewing the
>>> patches.
>>> 
>>> The only think I wonder about is whether we want to pass parameters " --uid
>>> 0 --gid 0 --debug-to-files" or we will read the from sssd.conf? I prefer
>>> reading them.
>>> 
>>> Also what do we use the private sockets for? It is used only for root?
>>
>>Yes, that's where we route PAM requests started by UID 0 to.
>>
>For example. The nss responder need't run as root. It does not require
>any extra privileges. And the privileges are dropped as soon as possible.
>The only issue might be with switching from root to non-root.
>A responder need to change owner of log files.
>But it could be solved with ExecStartPre in service file
>
>e.g.
>ExecStartPre=/usr/bin/chown sssd:sssd /var/log/sssd/sssd_nss.log
>ExecStart=/usr/libexec/sssd/sssd_nss --debug-to-files
>User=sssd
>Group=sssd
>PermissionsStartOnly=true
>
>@see the explanation of PermissionsStartOnly in man 5 systemd.service
>
Actually we might add new parameter "--unprivileged-start"
which would be used for skiping calls of *chown_debug_file*
+ *become_user* and also maybe checking that process is not
executed as root (uid != 0 && gid != 0)

LS
_______________________________________________
sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org
To unsubscribe send an email to sssd-devel-le...@lists.fedorahosted.org

Reply via email to