Rich access control lists
Rich access control lists
Posted Oct 22, 2015 1:13 UTC (Thu) by fandingo (guest, #67019)In reply to: Rich access control lists by Cyberax
Parent article: Rich access control lists
> so I'm curious to see the actual systems that depend on it.
I'm not sure any piece of software itself could "depend" on it. From the software's perspective, it's just eliminating extraneous syscalls and mode flags. It's the software distribution's (or perhaps the adventurous sys admin's) job to write and distribute a policy. The policy separation and delegation to distributions is same as SELinux.
Posted Oct 22, 2015 1:30 UTC (Thu)
by Cyberax (✭ supporter ✭, #52523)
[Link] (2 responses)
Of course, some people might also forbid any file activity on Sundays, so we need a special permission for that as well.
Posted Oct 22, 2015 1:50 UTC (Thu)
by fandingo (guest, #67019)
[Link] (1 responses)
Nonetheless, I doubt you'd have many people in such a scheme. But, let's dial it back from absurdity.
Posted Oct 22, 2015 22:58 UTC (Thu)
by Cyberax (✭ supporter ✭, #52523)
[Link]
At least with modebits I can understand what's happening immediately. With Windows ACLs you can't do that - you have to carefully evaluate the rules, keeping their order in mind. POSIX ACLs are ok-ish, they at least play nicely with the regular Unix permissions.
And your examples are so far extremely poor. If you need to constrain a daemon to use only O_APPEND - then write an LSM module for that. No need at all to rape file permissions. And if you are doing it over NFS then get a proper rsyslog, for FSM's sake.
So what are other examples, apart from the contrived O_APPEND?
Rich access control lists
Rich access control lists
Rich access control lists
