On Sun, Oct 12, 2014 at 07:17:02PM +0200, Christoph Anton Mitterer wrote: > On Sun, 2014-10-12 at 09:30 +0200, Guido Günther wrote: > > You can change the user running the VM in qemu.conf. > Sure :) I saw that but... okay we misunderstand each other I guess. > > My idea/understanding was the following: > > libvirt group - would be intended to be the group, for having permission > to talk to libvirt and it's VMs > > libvirt-qemu - would be intended to be the user/group, that qemu runs > under and that image files belong to (for the sake of privilege > separation) > > If it's like that, then one would expect: > - normal users shouldn't be added to libvirt-qemu (because they > shouldn't need to mess around with qemu directly, and especially they > shouldn't be able to access the VM images directly) > > - if users want to access libvirtd (for creating/starting/stopping/etc. > VMs and for connecting to their consoles),... they should be added to > libvirt group.
...as long as the console are "routed" through libvirt (e.g. xen used to work this way or lxc). > But if it's like this, it doesn't work as of now, at least not with > socket based VNC, cause the sockets are created by qemu and this with > libvirt-qemu owners. Because qemu creates them VNC socket.. > A solution would be probably needed upstream (e.g. that libvirtd changes > the permissions of the socket Yeah, that's why we should keep it open. Cheers, -- Guido
smime.p7s
Description: S/MIME cryptographic signature