Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <jwJLRnVfw9qn5wsHzRxO4mCtkAMJs9l7didEzdt2C9UBuFA7Td4ERwLG_9ZVtCy2SyomGMnZAgYJfJAjXhubHz07SaIQwTLmJemznO-W4CM=@protonmail.ch>
Date: Thu, 30 Mar 2023 14:08:10 +0000
From: Jordan Glover <Golden_Miller83@...tonmail.ch>
To: oss-security@...ts.openwall.com
Subject: Re: polkitd service user privilege separation

On Wednesday, March 29th, 2023 at 9:24 PM, Simon McVittie <smcv@...ian.org> wrote:


> polkitd can only be either trusted or untrusted, we can't have it both
> ways. I think the main thing that's wrong here is the documentation that
> claims that the privilege separation is meaningful.
> 
> smcv

Is it valid conclusion that polkitd would be better of just running as root? That would clear any possible confusion. Or are there advantages of running it as separate "trusted" user?

Jordan 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.