I haven't been really closely following this discussion, but I might
have a solution.

A quick glance at 'man chmod(1)' will show that there is an unused bit
in the file mask, namely '7000'. This has been there for quite a long
time. I discovered it in '94 when a student accidentally set it on her
home directory on HP-UX. Several hours of reading man pages later, I
discovered a '-H' option to 'ls' which showed "hidden files". It seems
that HP decided to use this unused bit to "hide" files and rewrote a
few binaries (ls, chmod, etc..) to support it.

Why not do the same sort of thing and use that extra bit to flag a
file, or directory, as being an ACL only file and will negate the rest
of the mask? That accomplishes what Paul is looking for, without
breaking the existing model for those that need/wish to continue to
use it?

No mad proliferation of private primary groups or bizarre scripted
workaround needed.

fpsm

On Tue, Mar 2, 2010 at 12:04 AM, Paul B. Henson <hen...@acm.org> wrote:
> On Mon, 1 Mar 2010, Nicolas Williams wrote:
>
>> Yes, that sounds useful.  (Group modebits could be applied to all ACEs
>> that are neither owner@ nor everyone@ ACEs.)
>
> That sounds an awful lot like the POSIX mask_obj, which was the bane of my
> previous filesystem, DFS, and which, as it seems history repeats itself, I
> was also unable to get an option implemented to ignore it and allow ACL's
> to work without impediment.
>
>> If users have private primary groups then you can have them run with
>> umask 007 or 002 and use set-gid and/or inherittable ACLs to ensure that
>> users can share files in specific directories.  (This is one reason that
>> I recommend always giving users their own private primary groups.)
>
> The only reason for the recommendation to give users their own private
> primary groups is because of the lack of flexibility of the umask/mode bits
> security model. In an environment with inheritable ACL's (that aren't
> subject to being violated by that legacy security model) there's no real
> need.
>
>> Alternatively we could have a new mode bit to indicate that the group
>> bits of umask are to be treated as zero, or maybe assign this behavior
>> to the set-gid bit on ZFS.
>
> So rather than a nice simple option granting ACL's immunity from umask/mode
> bits baggage, another attempted mapping/interaction?
>
> If you only ever access ZFS via CIFS from windows clients, you can have a
> pure ACL model. Why should access via local shell or NFSv4 be a poor
> stepchild and chained down with legacy semantics that make it exceedingly
> difficult to actually use ACL's for their intended purpose?
>
> --
> Paul B. Henson  |  (909) 979-6361  |  http://www.csupomona.edu/~henson/
> Operating Systems and Network Analyst  |  hen...@csupomona.edu
> California State Polytechnic University  |  Pomona CA 91768
> _______________________________________________
> zfs-discuss mailing list
> zfs-discuss@opensolaris.org
> http://mail.opensolaris.org/mailman/listinfo/zfs-discuss
>
_______________________________________________
zfs-discuss mailing list
zfs-discuss@opensolaris.org
http://mail.opensolaris.org/mailman/listinfo/zfs-discuss

Reply via email to