Hi,

On 14/11/13 13:57, Simon McVittie wrote:
> libpam-systemd derives the XDG_RUNTIME_PATH from the "loginuid", which
> was originally part of the audit framework. The loginuid was originally
> intended to answer questions like "yes, I know this process is root, but
> who is it really?" to provide an audit trail:

Thanks for the explanation. I wasn't aware of the rationale behind loginuid.
The historical intention makes sense, but I don't get why logind should
return XDG_RUNTIME_PATH based on this "really real uid" instead of the
effective uid, since that's what's going to be used for permission
control on the fs level. Am I missing something or do you mean to say
this is a questionable decision?

> (...)
> Even after gdm daemonizes and re-parents to init, its loginuid remains.
> That's sort of the point of loginuid.

Again, makes sense, but doesn't explain why XDG_RUNTIME_PATH must use
loginuid. If loginuid's main reason for existence is auditing, I should
still be able to see that my gdm was started by a su'd user 1000, but I
want it to get /run/user/<gdm's uid>, since that's the process effective
uid. Or more importantly, it seems really unintuitive (to say the least)
that a request for session creation for an *explicitly given* UID should
create a runtime dir for a different uid.
But again, I may be missing something obvious.

> The same thing breaks many tools when run under su (e.g. see
> <https://bugzilla.redhat.com/show_bug.cgi?id=753882>). There's some
> recent discussion on that bug: Ubuntu developers have been hit badly by
> it too.

If I understand you (and mentioned bug log) correctly, I guess this bug
should be reassigned (or at least cloned over) to systemd then?


Cheers


-- 
Leo "costela" Antunes
[insert a witty retort here]


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to