By default, Unix domain sockets are created with file system permission mode of 0700. Only the process of the belongs to the same user can access this socket.
For OVS, it may be more convenient to control access at the group level rather than at the user level, since the process needs to access OVSDB sockets or daemons' control sockets may not need the same permission as the OVS daemons. This patch change Unix domain sockets' file system permission to 0770, open up the group access. It has been a issue in the past since OVS, until very recently, has to run as root. If a process needs to access OVSDB, or OVS daemons' control sockets, it has to be a root process as well. With the added --user option to OVS daemons and this change, system administrators can deploy OVS more securely: OVS daemons can run as a non root user. Various processes that need to talk to OVS does not have to root process either. In fact, they can all run as different users, as long as they have sufficient rights to access OVS socket files. Signed-off-by: Andy Zhou <az...@nicira.com> --- lib/socket-util-unix.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/lib/socket-util-unix.c b/lib/socket-util-unix.c index afab195..1453384 100644 --- a/lib/socket-util-unix.c +++ b/lib/socket-util-unix.c @@ -349,6 +349,11 @@ make_unix_socket(int style, bool nonblock, } free_sockaddr_un(dirfd, linkname); + if (!error) { + /* Allow users with in the same group to connect. */ + error = chmod(bind_path, 0770); + } + if (error) { goto error; } -- 1.9.1 _______________________________________________ dev mailing list dev@openvswitch.org http://openvswitch.org/mailman/listinfo/dev