On Thu Mar 13, 2014 at 14:46:37 +0100, Ulric Eriksson wrote:

> The control socket and the configuration file use the exact same
> syntax by design.

  I see that is currently the case, yes..

> If it is impossible or impractical to limit
> access to the socket, the same level of control over a running Pen
> can be accomplished from localhost by editing the config and an
> old-fashioned HUP.

  While this is true, and people are free to run things as they
 wish, I've been assuming a root-owned configuration file & init
 script.  So an unprivileged local user wouldn't be able to either
 reload or edit the config.

> A password would imply that the protocol is safe, which it
> obviously isn't - it is plain text over tcp.

  I don't see the connection there.  You might express it in
 reverse "Because the control socket allows 'unsafe things' a
 password proves you have legitimate reason to talk to/with it."

> A Unix-domain control socket is a trivial change which wouldn't
> break anything but allow much more fine-grained control over who
> has access from localhost. A brilliant idea which I congratulate
> myself on.

  Actually that didn't occur to me, but as you say it is a lovely
 solution.  Root could start the deamon with the socket having
 mode 600 and local users wouldn't be able to do bad things with it,
 similarly a local user could have ~/.pen.sock and they'd be safe
 against other local users - but not root, of course.

  Use a domain-socket and I think things become much tighter. 
 Great idea!

Steve
--
Let me steal your soul?
http://stolen-souls.com


-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to