sasl/rc.sasl

Mon, 20 Apr 2009 19:22:00 +0200

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Mon, 20 Apr 2009 19:22:00 +0200
changeset 178
0ba300bdf30a
permissions
-rw-r--r--

Change unfortunate but partly useful overreaching security tradeoff.
The principle of allocating each running process an individual system
user and group can have security benefits, however maintining a plethora
of users, groups, processes, file modes, file permissions, and even
nonportable file ACLs on a host serving from a hundred processes has
some security disadvantages. This tradeoff is even worse for systems
like OpenPKG which benefit from administration transparency through the
use of minimal system intrusion and only three usage privilege levels.

michael@144 1 #!@l_prefix@/bin/openpkg rc
michael@144 2 ##
michael@144 3 ## rc.sasl -- Run-Commands
michael@144 4 ##
michael@144 5
michael@144 6 %config
michael@144 7 sasl_enable="$openpkg_rc_def"
michael@144 8 sasl_flags=""
michael@144 9 sasl_authmech="@l_authmech@"
michael@144 10 sasl_threads="4"
michael@144 11 sasl_log_prolog="true"
michael@144 12 sasl_log_epilog="true"
michael@144 13 sasl_log_numfiles="10"
michael@144 14 sasl_log_minsize="1M"
michael@144 15 sasl_log_complevel="9"
michael@144 16
michael@144 17 %common
michael@144 18 sasl_pidfile="@l_prefix@/var/sasl/run/saslauthd/saslauthd.pid"
michael@144 19 sasl_signal () {
michael@144 20 [ -f $sasl_pidfile ] && kill -$1 `cat $sasl_pidfile`
michael@144 21 }
michael@144 22
michael@144 23 %status -u @l_susr@ -o
michael@144 24 sasl_usable="unknown"
michael@144 25 sasl_active="no"
michael@144 26 rcService sasl enable yes && \
michael@144 27 sasl_signal 0 && sasl_active="yes"
michael@144 28 echo "sasl_enable=\"$sasl_enable\""
michael@144 29 echo "sasl_usable=\"$sasl_usable\""
michael@144 30 echo "sasl_active=\"$sasl_active\""
michael@144 31
michael@144 32 %start -p 400 -u @l_susr@
michael@144 33 rcService sasl enable yes || exit 0
michael@144 34 rcService sasl active yes && exit 0
michael@144 35 @l_prefix@/sbin/saslauthd \
michael@144 36 -a "${sasl_authmech}" \
michael@144 37 -n "${sasl_threads}" \
michael@144 38 ${sasl_flags}
michael@144 39
michael@144 40 %stop -p 600 -u @l_susr@
michael@144 41 rcService sasl enable yes || exit 0
michael@144 42 rcService sasl active no && exit 0
michael@144 43 sasl_signal TERM
michael@144 44
michael@144 45 %restart -u @l_susr@
michael@144 46 rcService sasl enable yes || exit 0
michael@144 47 rcService sasl active no && exit 0
michael@144 48 rc sasl stop
michael@144 49 sleep 2
michael@144 50 rc sasl start
michael@144 51
michael@144 52 %daily -u @l_susr@
michael@144 53 rcService sasl enable yes || exit 0
michael@144 54 shtool rotate -f \
michael@144 55 -n ${sasl_log_numfiles} -s ${sasl_log_minsize} -d \
michael@144 56 -z ${sasl_log_complevel} -o @l_susr@ -g @l_sgrp@ -m 600 \
michael@144 57 -P "${sasl_log_prolog}" \
michael@144 58 -E "${sasl_log_epilog}; rc sasl restart" \
michael@144 59 @l_prefix@/var/sasl/log/saslauthd.log
michael@144 60

mercurial