On Tue, Mar 15, 2011 at 11:09:13PM +0100, Georges Khaznadar wrote:
> Hello Bill,
> 
> the override was intended to make a few commands as low privileged 
> as possible. Most of the files under the subdirectory /var/lib/wims are
> owner by the system user "wims", which is created for the sake of the
> package wims. Instead of making nobody:nogroup to own these commands,
> I may create another pair of user/group, for instance nowims/nowims and
> use this pair to achieve the same goal.
> 
> Do you agree with this possibility?

The issue is not with $lambdawrapper running as nobody:nogroup which is fine.
The issue is that the file is owned by nobody:nogroup.

One solution is to make it suid root and do a setreuid(nobody)/setregid(nogroup)
at startup.

Beside nobody and nogroup are not dynamically allocated UID/GID so it is 
improper
to use dpkg-statoverride.

> By the way, please can you give me some link about the problem which
> arises with the usage of nobody/nogroup?

nobody:nogroup are reserved for runtime process priviledge. No files should be 
owned
by nobody:nogroup. This way, a process running with the priviledge of 
nobody:nogroup
has no special priviledge (it qualifies as 'other' for all files).

If the file $lambdawrapper was owned by nobody:nogroup, then a nobody:nogroup 
process
could write to it since it is 6755, thus defeating the prupose of 
nobody:nogroup.

For reference see /usr/share/doc/base-passwd/users-and-groups.txt.gz
nobody, nogroup

    Daemons that need not own any files sometimes run as user nobody and group
    nogroup, although using a dedicated user is far preferable. Thus, no files
    on a system should be owned by this user or group.

Cheers,
Bill.



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to