From mboxrd@z Thu Jan 1 00:00:00 1970 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Date: Fri, 16 Nov 2018 14:43:10 +0100 From: Christoph Pleger In-Reply-To: <20181115175718.GE5291@agk-dp.fab.redhat.com> References: <20181115175718.GE5291@agk-dp.fab.redhat.com> Message-ID: <2a7f4f1fc1a54fd6eca7d7bc9a6249ae@cs.uni-dortmund.de> Subject: Re: [linux-lvm] lvcreate from a setuid-root binary Reply-To: LVM general discussion and development List-Id: LVM general discussion and development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , List-Id: Content-Type: text/plain; charset="us-ascii"; format="flowed" To: LVM general discussion and development Cc: Alasdair G Kergon Hello, > Let's stop there. The fact you're asking a question about setuid > suggests you don't understand enough to be able to use it safely. I get security by checking the real user id at the beginning of the program and aborting the program if that uid does not belong to the only user who is allowed to run the program. That user is me and I guess that it is much more insecure to run the whole service that wants to authenticate users through PAM as root. > Go back to the beginning and describe the original problem you are > trying to solve and the constraints you have and ask for advice about > ways to achieve it. The beginning is that I want to create a user-specific logical volume when a user logs in to a service that authenticates its users through pam and that does not run as root. Regards Christoph