[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: getpeercred() on the Hurd



Samuel Thibault, le Wed 18 Jun 2008 12:56:53 +0100, a écrit :
> Neal H. Walfield, le Wed 18 Jun 2008 13:43:41 +0200, a écrit :
> > At Wed, 18 Jun 2008 12:41:48 +0200,
> > Neal H. Walfield wrote:
> > > 
> > > At Wed, 18 Jun 2008 12:20:10 +0200 (CEST),
> > > Arthur de Jong wrote:
> > > > > One question you should consider is: why do you need this information?
> > > > [...]
> > > > 
> > > > I agree with your point in general and think there are better ways to 
> > > > do access control.
> > > > 
> > > > nss-ldapd is an NSS module that does lookups in an LDAP database. The NSS 
> > > > module does not do the lookup itself (this causes a lot of headaches) but 
> > > > offloads it to a deamon (nslcd). Most NSS calls should be no problem but 
> > > > shadow calls pose an exception to that. The server (nslcd) will only 
> > > > return shadow information if it can determine that the caller runs as 
> > > > root.
> > > > 
> > > > So I would like to keep one socket for all requests and not mess with 
> > > > permissions of sockets.
> > > 
> > > Sounds broken.  Good luck.
> > 
> > That wasn't very helpful.  If you are dead set on using IBAC, you
> > could use the auth protocol to establish the identify of the client.
> > The interface is described in auth/auth.defs .
> 
> Well, I guess he doesn't have a running Hurd system.
> 
> Actually I guess we could easily add SO_PASSCRED to pflocal sockets, by
> using auth_user_authenticate/auth_server_authenticate indeed.

(I mean SO_PASSCRED and then use SCM_CREDENTIALS to pass credentials
through the socket)

Samuel


Reply to: