Re: Excessive root usage in Debian
On Wed, Oct 13, 1999 at 10:44:14PM -0500, The Doctor What wrote:
> Then there are other OS's; Does Hurd have a more complete security model?
Currently, the Hurd servers provide POSIX semantics, with the following
There is a fourth "group" beside owner, group and others. Those are the
users who are "not-logged-in" (to be used with a login *shell*).
Everybody can have multiple available uids as well as multiple available
gids. For the sake of POSIX, only one uid/gid at a time is the "active" one.
As a system administrator, you can have any security model you can implement
as a auth server, of course, if you drop posix compatibility, you will need
to change the existing hurd servers and glibc to cope with it.
As a user, you can probably (later?) add your own auth server to the system,
and you can do whatever you can put within your user (POSIX) restrictions
in the background.
`Rhubarb is no Egyptian god.' Debian http://www.debian.org Check Key server
Marcus Brinkmann GNU http://www.gnu.org for public PGP Key
Marcus.Brinkmann@ruhr-uni-bochum.de, firstname.lastname@example.org PGP Key ID 36E7CD09