site_archiver@lists.apple.com Delivered-To: darwin-dev@lists.apple.com Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:cc:message-id:from:to :in-reply-to:content-type:mime-version:subject:date:references :x-mailer; bh=liOIP26MtAkLzoYEcNcBPn45JqW4S5p4gu5DT2szLjU=; b=QTnuXWon0zkytKgriwnCyBcWB9XpCdBM3fl4ZupX39PgYD8llRSB2ocrLt7Y/436th SSrF8uK9gZe+3SXwJ6/2YQKtJ2Htc4yHlS6nfZlebhRMHWlMWuKEBx+01QqhLWFquY9W o4+FCYKq3aaukXaQx66TqxyPpTSzUJWKjIilI= Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=cc:message-id:from:to:in-reply-to:content-type:mime-version:subject :date:references:x-mailer; b=KkBLx0ix6p/FgFBT0WfHmVI7LBdBjRvITAJ7aDIEAuN20eb+FPs8APp1SRo/D+4tnO 2khsBPh7xylLlhTYLK7amOHEjXMu+aIMO+ygWmJufATyg5avpouL2/NmuyNB2T/6Kgnj 9IZM+p2eVYXjz2/QknoLvcOoAnxDhljskAM+4= On Oct 3, 2008, at 16:26 , Damien Sorresso wrote: Actually, it is because it needs to bind to a privileged port. J _______________________________________________ Do not post admin requests to the list. They will be ignored. Darwin-dev mailing list (Darwin-dev@lists.apple.com) Help/Unsubscribe/Update your Subscription: http://lists.apple.com/mailman/options/darwin-dev/site_archiver%40lists.appl... This email sent to site_archiver@lists.apple.com On Oct 3, 2008, at 1:05 PM, Jordan K. Hubbard wrote: On Oct 3, 2008, at 8:02 PM, Damien Sorresso wrote: The pref pane includes a setuid helper application that does proper authorization, etc. Your privileged operations should be done in your daemon. We heavily discourage the use of setuid tools, and we're actively trying to cleanse the system of them. Just so I understand what you're advocating here... Are you seriously suggesting that the entire daemon should be privileged rather than using a privilege-separated helper tool? That seems to run counter to generally accepted security practices (make privileged things as small as possible), so I must be mis-parsing your recommendations here... He mentioned that his daemon's plist lives in /Library/LaunchDaemons and that it was a privileged operation to talk to it, and I mistakenly interpreted that as "My daemon is running as root", which is not necessarily true. So no, I'm not advocating that all system-wide daemons run as root; I mistakenly concluded that his was. I have another question, tho, Damien. If I want to use a UNIX socket to do the IPC, do I have to create the socket myself? launchd doesn't seem to create and bind it when I use the SockPathName key... smime.p7s