Welcome to mirror list, hosted at ThFree Co, Russian Federation.

cygwin.com/git/newlib-cygwin.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJoshua Daniel Franklin <joshuadfranklin@yahoo.com>2005-01-30 01:35:17 +0300
committerJoshua Daniel Franklin <joshuadfranklin@yahoo.com>2005-01-30 01:35:17 +0300
commitd0ae095b8cebb70f5c73783e816fc41779902913 (patch)
tree20cda859dc63db94e43d4f2e97f35f67abcd35a6 /winsup/doc/ntsec.sgml
parente86f8b7925d1da7b87d8235856cb757233546e36 (diff)
* ntsec.sgml: Add Pierre's Windows 2003 text.
Diffstat (limited to 'winsup/doc/ntsec.sgml')
-rw-r--r--winsup/doc/ntsec.sgml34
1 files changed, 23 insertions, 11 deletions
diff --git a/winsup/doc/ntsec.sgml b/winsup/doc/ntsec.sgml
index c366fd21f..4859feb48 100644
--- a/winsup/doc/ntsec.sgml
+++ b/winsup/doc/ntsec.sgml
@@ -737,21 +737,33 @@ etc.
Context</title>
<para>
-Since Cygwin release 1.3.3, applications having the
-<command>Create a process level token</command> user right can switch user
+Since Cygwin release 1.3.3, applications that are members of the
+Administrators group and have the <command>Create a token
+object</command>, <command>Replace a process level token</command> and
+<command>Increase Quota</command> user rights can switch user
context without giving a password by just calling the usual
<command>setuid</command>, <command>seteuid</command>,
-<command>setgid</command> and <command>setegid</command> functions. This is
-typically only given to the SYSTEM user. However, this now allows to switch
-the user context using e. g. rhosts authentication or (when running sshd
-under SYSTEM account as service) public key authentication.
+<command>setgid</command> and <command>setegid</command> functions.
</para>
<para>
-An important restriction of this method is that a process started under
-SYSTEM account can't access network shares which require authentication.
-This also applies to the subprocesses which switched the user context
-without a password. People using network home drives are typically not
-able to access it when trying to login using ssh or rsh without password.
+On NT and Windows 2000 the <systemitem
+class="username">SYSTEM</systemitem> user has these privileges and can
+run services such as <command>sshd</command>. However, on Windows 2003
+<systemitem class="username">SYSTEM</systemitem> lacks the
+<command>Create a token object</command> right, so it is necessary to
+create a special user with all the necessary rights, as
+well as <command>Logon as a service</command>, to run such services.
+For security reasons this user should be denied the rights to logon
+interactively or over the network. All this is done by configuration
+scripts such as <command>ssh-host-config</command>.
+</para>
+<para>
+An important restriction of this method is that a process started
+without a password cannot access network shares which require
+authentication. This also applies to subprocesses which switched user
+context without a password. Therefore, when using
+<command>ssh</command> or <command>rsh</command> without a password, it
+is typically not possible to access network drives.
</para>
</sect2>