|
Message-ID: <20140610232506.7f9558c2@ncopa-laptop> Date: Tue, 10 Jun 2014 23:25:06 +0200 From: Natanael Copa <ncopa@...inelinux.org> To: Rich Felker <dalias@...c.org> Cc: musl@...ts.openwall.com Subject: Re: musl 1.0.x branch On Tue, 10 Jun 2014 12:03:56 -0400 Rich Felker <dalias@...c.org> wrote: > FYI you can emulate the usefulness of suid, without the danger, by > having a daemon on a unix socket that you connect to which provides > the functionality. This is a vastly superior design because there is > exactly one input channel to the code running with elevated privileges > (the socket) as opposed to unboundedly many (environment, open fds, > resource limits, working directory, priority, signal mask and > dispositions, cpu affinity, ... and whatever else the kernel folks add > in the future). You probably knew but this is what OpenBSD does instead of suid + PAM: http://en.wikipedia.org/wiki/BSD_Authentication I have always liked this approach. -nc
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.