Yes, world readable/writable files can still be accessed by dropping the new privileges. One reason are library calls that need to read some public files (like things in /etc). The need to manipulate or remove world writable files is harder to justify, on the other hand, world writable files are hard to find.
One may define two additional basic privileges (say PRIV_FILE_ALLOW_{WRITE|READ}) that would be checked first, but so, we have two further privileges 8-) -----Ursprüngliche Nachricht----- Von: [EMAIL PROTECTED] im Auftrag von [EMAIL PROTECTED] Gesendet: Do 22.06.2006 11:55 An: Nicolas Williams Cc: Nicolai Johannes; [EMAIL PROTECTED]; zfs-discuss@opensolaris.org; Mark Shellenbaum Betreff: Re: AW: AW: [zfs-discuss] Proposal for new basic privileges related with filesystem access checks >On Thu, Jun 22, 2006 at 01:01:38AM +0200, [EMAIL PROTECTED] wrote: >> I'm not sure if I like the name, then; nor the emphasis on the >> euid/egid (as those terms are not commonly used in the kernel; >> there's a reason why the effective uid was cr->cr_uid and not cr_euid. >> >> In other words, what your are doing is creating a "nobody" user with >> an ordinary user id. > >Yes. It's kind of enticing. I'm not entirely clear as to the problem which it solves; I think I'd much rather have a user which cannot modify anything. As I understand the proposal, you can still read/modify world accessible files. >As I interpret the proposal file creation in /tmp would succeed, but >opening existing files owned by the process' actual euid cannot be >opened if thes basic privs are dropped. Right; but often programs work by reopening such files; that will now fail. >How would dropping this basic priv work with NFS though? Not until we make privileges visible over NFS which is a tough nut to crack. Casper _______________________________________________ zfs-discuss mailing list zfs-discuss@opensolaris.org http://mail.opensolaris.org/mailman/listinfo/zfs-discuss