> > why do you think that the lack of a super user make per-process namespaces
> > work?
> 
> The fact that you own the hardware you are running on means there's no 
> need to provide enhanced priv's (such as root) to protect things like 
> mount(2).  

that's a property of per-process namespaces, not the lack of a root user.

in this sense plan 9 has a limited root—the hostowner that owns the devices
on a machine and is trusted wrt the authentication protocol.

> And if you do something stupid, the only damage you can do is 
> to yourself.  Just look at all the hoops FUSE must jump through to keep 
> people from being able to bodge the entire system.

for some reason, the linux guys have convinced themselves that per process
namespaces can't be done without security problems.  i see no reason that
pam couldn't do plan 9 style authentication with a process running on behalf
of root with its own namespace.

they've changed everything else in unix, why hold so tightly to the clearly
unhelpful ideas?

- erik

Reply via email to