[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Excessive root usage in Debian

On Wed, Oct 13, 1999 at 10:44:14PM -0500, The Doctor What wrote:
> Then there are other OS's; Does Hurd have a more complete security model?

Currently, the Hurd servers provide POSIX semantics, with the following

There is a fourth "group" beside owner, group and others. Those are the
users who are "not-logged-in" (to be used with a login *shell*).

Everybody can have multiple available uids as well as multiple available
gids. For the sake of POSIX, only one uid/gid at a time is the "active" one.

As a system administrator, you can have any security model you can implement
as a auth server, of course, if you drop posix compatibility, you will need
to change the existing hurd servers and glibc to cope with it.

As a user, you can probably (later?) add your own auth server to the system,
and you can do whatever you can put within your user (POSIX) restrictions
in the background.


`Rhubarb is no Egyptian god.' Debian http://www.debian.org Check Key server 
Marcus Brinkmann              GNU    http://www.gnu.org    for public PGP Key 
Marcus.Brinkmann@ruhr-uni-bochum.de,     marcus@gnu.org    PGP Key ID 36E7CD09
http://homepage.ruhr-uni-bochum.de/Marcus.Brinkmann/       brinkmd@debian.org

Reply to: