<div dir="ltr"><div class="gmail_quote">On Wed, 13 May 2015 at 02:16 Thierry Carrez <<a href="mailto:thierry@openstack.org">thierry@openstack.org</a>> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Lucas Fisher wrote:<br>
> We spent some time at the OSSG mid-cycle meet-up this week discussing root wrap, looking at the existing code, and considering some of the mailing list discussions.<br>
><br>
> Summary of our discussions: <a href="https://github.com/hyakuhei/OSSG-Security-Practices/blob/master/ossg_rootwrap.md" target="_blank">https://github.com/hyakuhei/OSSG-Security-Practices/blob/master/ossg_rootwrap.md</a><br>
><br>
> The one line summary is we like the idea of a privileged daemon with higher level interfaces to the commands being run. It has a number of advantages such as easier to audit, enables better input sanitization, cleaner interfaces, and easier to take advantage of Linux capabilities, SELinux, AppArmour, etc. The write-up has some more details.<br>
<br>
For those interested in that topic and willing to work on the next<br>
stage, we'll have a work session on the future of rootwrap in the Oslo<br>
track at the Design Summit in Vancouver:<br>
<br>
<a href="http://sched.co/3B2B" target="_blank">http://sched.co/3B2B</a><br><br></blockquote><div><br></div><div>Fwiw, I've continued work on my privsep proposal(*) and how it interacts with existing rootwrap. I look forward to discussing it and alternatives at the session.</div><div><br></div><div>(*) <a href="https://review.openstack.org/#/c/155631">https://review.openstack.org/#/c/155631</a></div><div><br></div><div> - Gus</div></div></div>