Olaf Meeuwissen <paddy-h...@member.fsf.org> wrote:

> No idea whether systemd services run by non-system users makes sense but
> then again, lots of systemd probably doesn't make much sense.

Do you mean "systemd service" as in "something that's part of systemd"; or do 
you mean "something that's run by systemd" ?
Assuming the latter, doesn't lots of software run as non-system users - as a 
basic part of good security practice ?

I know some stuff (postfix, apache) starts as root and then drops privileges 
for some/all of itself. Others just start as a non-privileged user to start 
with (BIND) - is this actually done in the script when using sysv, or does the 
daemon have to do it itself ? I admit I only have a basic grasp of the details 
here.


But thinking a bit more about the issue ...
Yes, this is a bug, and yes it shows the systemd people (especially LP) up for 
the disdain they show for the basics of security, good/defensive programming, 
etc.
But, sysv-init has much the same issue in that there's a shell script run as 
root, and if the user is able to manipulate that then he is able to do things 
he shouldn't be able to. Playing devil's advocate, there's an argument that the 
"complexity" of typical sysv scripts (at least as shipped with distros like 
Debian) makes it a non-trivial task to spot something slipped into the script.

_______________________________________________
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng

Reply via email to