[SECURITY] CoreFreq access limitation #310
Closed
cyring
started this conversation in
Show and tell
Replies: 1 comment
-
Commit fd22d04 is enhancing the The default mode (no option supplied) is a permissive mode for all users:
If your Organization requires a more secured mode, you can combine the 3 options For example, restricting the CoreFreq access to a unique account:
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Limitation is based on the Linux security.
The Daemon can be launched with a User and/or Group passed as options.
65432
is theuid
ofnobody
and987
is thegid
ofusers
, run as root the Daemon like bellow:users
corefreq-cli
will output the following error:The default case
This is the major change in CoreFreq.If you don't supply any options, the Daemon will set both
uid
andgid
toroot
; thus onlyroot
will be able to runcorefreq-cli
Testings
This change is so far available in the
develop
branch.It has been especially made for Datacenters, Production, and other online systems.
I will appreciate any returns, criticisms, any attempt to break this security ...
Beta Was this translation helpful? Give feedback.
All reactions