Bug 120061
Summary: | unix.7: Extend notes about ignored permissions for UNIX domain sockets | ||
---|---|---|---|
Product: | Documentation | Reporter: | Carsten Grohmann (carstengrohmann) |
Component: | man-pages | Assignee: | documentation_man-pages (documentation_man-pages) |
Status: | RESOLVED CODE_FIX | ||
Severity: | normal | CC: | mtk.manpages |
Priority: | P1 | ||
Hardware: | All | ||
OS: | Linux | ||
Kernel Version: | Subsystem: | ||
Regression: | No | Bisected commit-id: |
Description
Carsten Grohmann
2016-06-12 10:54:14 UTC
Hi Carsten Thanks for the report. Have you done any testing of current systems? I tested OpenBSD 5.9, and it seems that there the socket file permissions are checked, as you say. I also tested Solaris 10, and there it looks as though socket file permissions are (still) ignored. Cheers, Michael For now, I have applied the patch below. Maybe I will do more, depending on further info that you can supply. --- a/man7/unix.7 +++ b/man7/unix.7 @@ -232,7 +232,7 @@ connecting to a stream socket object requires write permission on that socket; sending a datagram to a datagram socket likewise requires write permission on that socket. POSIX does not make any statement about the effect of the permissions -on a socket file, and on many systems (e.g., several BSD derivatives), +on a socket file, and on some systems (e.g., older BSDs), the socket permissions are ignored. Portable programs should not rely on this feature for security. Lacking any further input, I'm going to consider this resolved. Please reopen if you think something more is required. |