Date: Thu, 24 Oct 1996 21:28:30 -0700 (PDT) From: "Rodney W. Grimes" <rgrimes@GndRsh.aac.dev.com> To: softweyr@xmission.com (Softweyr LLC) Cc: wollman@lcs.mit.edu, security@FreeBSD.ORG, softweyr@xmission.xmission.com Subject: Re: Any FreeBSD security topics of interest? Message-ID: <199610250428.VAA09284@GndRsh.aac.dev.com> In-Reply-To: <199610242310.RAA01706@xmission.xmission.com> from Softweyr LLC at "Oct 24, 96 05:10:35 pm"
next in thread | previous in thread | raw e-mail | index | archive | help
> > I have to say that I have always preferred AFS's per-directory ACL > > semantics to the more commonly implemented per-file ACLs. AFS does > > not use the group and other permission bits at all, but applies the > > user bits as a mask against certain rights given by the ACL. The > > permission bits in AFS ACLs are `rwidlka', for `read', `write', > > `insert', `delete', `lookup', `lock', and `administer' (i.e., change > > the ACL). This enables certain nice features such as authenticated > > local mail delivery (make a directory with permissions `System:AnyUser > > lik' and they can create new mail files in that directory but cannot > > read, write, or delete existing ones; the owner of the file is the > > authenticated sender). > > I had the opposite reaction the first time I read about them: why did > they do this? The AFS ACL system does not, for instance, allow you to > make a setuid-root executable that can be run by wes, sam, and DJ, > but nobody else, unless you create a group that holds only those people > and make it group executable. This leads to a lot of small special- > purpose groups that have to be maintained. > > The per-file ACLs do demand more administration, but also allow more > power and flexibility. > > The AFS model does show that we can implement more semantics that just > read, write, and execute however. The overlaid semantics of rwx and > sticky on directories could be eliminated by adding a 'delete' privilege > to the file ACL, like VMS has. > > Lotsa design work to be done on this project, eh? ;^) Lotsa research should be done before _any_ design work. At a minimum I would look at 3 or 4 implementations that exist today, say for example the VMS you mentioned (has everything including the kitchen sink), Apollo (now HP) Domain/OS (but go to the real root of that design, Apollo Aegis, the first _real_ ``the network is the computer'' design), consider what AFS has implemented, and then someone like Primos or other unix ACL variant. Personally, I would do a mixed implemtation of Aegis ACLS, with the addition of file access alert classes and some of the other ``special'' VMS acls, and use the VMS Logic Name Table mechanism for ``variant'' ACL's (and added whistle by me :-)). I would retain the Aegis Initial default file and default directory ACL's. -- Rod Grimes rgrimes@gndrsh.aac.dev.com Accurate Automation, Inc. Reliable computers for FreeBSD
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199610250428.VAA09284>
