9fans - fans of the OS Plan 9 from Bell Labs
 help / color / mirror / Atom feed
From: andrey mirtchovski <mirtchov@cpsc.ucalgary.ca>
To: 9fans@cse.psu.edu
Subject: [9fans] cron authentication
Date: Mon, 28 Jul 2003 14:47:47 -0600	[thread overview]
Message-ID: <Pine.LNX.4.44.0307281440380.30573-100000@fbsd.cpsc.ucalgary.ca> (raw)

I got asked today to explain how exactly auth servers, factotum and secstore
work together, and I think I did a pretty good job at it, until I was asked
how authentication proxies (such as cron) would work in Plan 9.

My question is, exactly how does Plan 9's cron work? Does it keep a set of
keys for the different users it speaks for?

I can see from the source that cron does the following dance:

	fork()
	...
	become andrey
	call auth_proxy as andrey
		open factotum/rpc
		... normal authentication ...
	run rexec as andrey
	...
	exit()

but where does it get the key to authenticate?


The archives show this old mail from the time when, presumably, factotum was
still in development:

	> [snip] For example, I can have a hostagent
	> running on my terminal that brokers all authentication for my processes,
	> even ones on cpu servers.  However, when making calls out from a cpu
	> server, I still have to trust the owner of that cpu server to be running
	> a system that does what my processes ask it to.  Hence, I'm trusting the
	> host owner making him a super-user of sorts.  However, the sphere of trust
	> can be much more arbitrariy and egocentric and I like that.

	> Cron in such a system becomes much harder.  The cron process has to
	> possess some of  my private keys in order to do it's job.  I could
	> limit its ability by certifying scripts that it runs but that's more
	> work.  However, I think I'm going to bite the bullet and do it.

Does cron possess this set of private keys?

andrey




             reply	other threads:[~2003-07-28 20:47 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2003-07-28 20:47 andrey mirtchovski [this message]
2003-07-28 21:44 ` andrey mirtchovski

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=Pine.LNX.4.44.0307281440380.30573-100000@fbsd.cpsc.ucalgary.ca \
    --to=mirtchov@cpsc.ucalgary.ca \
    --cc=9fans@cse.psu.edu \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).