Deutsch English Français Italiano |
<vec5bu$oa3$1@reader1.panix.com> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!weretis.net!feeder9.news.weretis.net!panix!.POSTED.spitfire.i.gajendra.net!not-for-mail From: cross@spitfire.i.gajendra.net (Dan Cross) Newsgroups: comp.os.vms Subject: Re: Apache + mod_php performance Date: Fri, 11 Oct 2024 21:29:34 -0000 (UTC) Organization: PANIX Public Access Internet and UNIX, NYC Message-ID: <vec5bu$oa3$1@reader1.panix.com> References: <vcv0bl$39mnj$1@dont-email.me> <vebjse$3nq13$1@dont-email.me> <vebo7q$5b8$1@reader1.panix.com> <vec4sb$3qc1e$1@dont-email.me> Injection-Date: Fri, 11 Oct 2024 21:29:34 -0000 (UTC) Injection-Info: reader1.panix.com; posting-host="spitfire.i.gajendra.net:166.84.136.80"; logging-data="24899"; mail-complaints-to="abuse@panix.com" X-Newsreader: trn 4.0-test77 (Sep 1, 2010) Originator: cross@spitfire.i.gajendra.net (Dan Cross) Bytes: 2450 Lines: 35 In article <vec4sb$3qc1e$1@dont-email.me>, Dave Froble <davef@tsoft-inc.com> wrote: >On 10/11/2024 1:45 PM, Dan Cross wrote: >> In article <vebjse$3nq13$1@dont-email.me>, >> Dave Froble <davef@tsoft-inc.com> wrote: >>> On 10/11/2024 9:30 AM, Dan Cross wrote: >>>> [snip] >>>> As I gather, on VMS the analogous mechanism works since a) every >>>> socket on the system is associated with a unique device name in >>>> some global namespace, and b) once known, an unrelated process >>>> can $ASSIGN that device name, subject to authorization checking >>>> enforced by the system. The authorization checks seem to be >>>> either, a) a process/subprocess relationship, or b) the >>>> assigning process has the SHARE privilege; it's not clear to me >>>> what else could go into those checks and how that interacts with >>>> e.g. SO_SHARE; presumably at least UIC checks or something must >>>> be completed? >>> >>> The share flag is for the device. >> >> Ok, sure. But does that mean that there's _no_ authorization >> checking of any kind to access the device? For example, no >> checking UICs or ACLs or something? If I set SO_SHARE on a >> socket, can _any_ process on the system, regardless of who it is >> running as, access that socket? > >Dan, it's been quite a while, so I'd have to research that question. > >If I had to guess, I'd expect all VMS protections and such to be respected. I >doubt one could just go out and access any BG device without having access. I should hope so, Dave, but as it is, it looks under documented at best. - Dan C.