-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 03/27/2014 12:30 AM, William Brown wrote: > On Wed, 2014-03-26 at 13:43 -0400, Stephen Gallagher wrote: >> On 03/26/2014 10:06 AM, Jaroslav Reznik wrote: >> >> <snip> >>> Note that PrivateNetwork=yes should not be used for: >>> >>> 1. Services that actually require network access (with the >>> exception of daemons only needing socket activation) 2. >>> Services which may be used to execute arbitrary user or >>> administrator supplied programs. (see above) 3. Services which >>> might need to resolve non-system user and group names. Since on >>> some setups resolving non-system users might require network >>> access to an LDAP or NIS server, enabling this option on might >>> break resolving of these user names. Note however that system >>> users/groups are always resolvable even without network access. >>> Hence it is safe to enable this option for daemons which just >>> need to resolve their own system user or group name. >> >> This may not be a safe statement to make. I personally know of a >> great many deployments where admins have removed the local >> accounts for their services and instead rely on LDAP accounts. >> (This is mostly to guarantee that the file ownership of these >> services is the same user on all systems, which they may not be >> if the local account was created using the 'get-next-free-id' >> approach). >> >> We'd need to think very hard about whether any service should >> have this turned on by default. If we *do* enable it by default, >> we should also carefully document how to turn it off for those >> services if they rely on centrally-managed accounts. > > Would PrivateNetwork break interactions with SSSD? If you used that > to provide nsswitch, then it may not be such an issue. > Hmm, good point. It would be talking to SSSD via a local socket. Naturally this feature wouldn't affect the SSSD daemon. So yeah, that would probably work just fine. I didn't think that all the way through originally. This probably can break people using nss_ldap or nss_winbind, though. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iEYEARECAAYFAlM0FEwACgkQeiVVYja6o6NTGwCdFSprsfcoYN52RwfUcL9+ZoGA rtcAoJnWcV7mC8wO/YHtbQ9UTnhoQKrF =dOqN -----END PGP SIGNATURE----- -- devel mailing list devel@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct