Skip to content

Commit a33fb88

Browse files
authored
Merge pull request #309 from grondo/spec15-fix
rfc15: change flux-security-imp to flux-imp
2 parents 3ca4e2a + 8eb0103 commit a33fb88

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

spec_15.rst

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ design
120120
- The IMP SHALL be an independent Flux Framework project, with the ability
121121
to be tested standalone
122122

123-
- The IMP SHALL be implemented as an executable, ``flux-security-imp``,
123+
- The IMP SHALL be implemented as an executable, ``flux-imp``,
124124
which MAY be installed with setuid permissions in cases where multi-user
125125
Flux is required.
126126

@@ -129,10 +129,10 @@ design
129129

130130
Implementation of the IMP as a separately installed, setuid executable
131131
allows sysadmin control over where and how the IMP is enabled. If the
132-
``flux-security-imp`` executable is not installed, or installed without
132+
``flux-imp`` executable is not installed, or installed without
133133
setuid bits enabled, then multi-user Flux is simply not available, though
134134
single user instances of Flux will still operate. The file permissions,
135-
access controls, or SELinux policy of ``flux-security-imp`` may also be
135+
access controls, or SELinux policy of ``flux-imp`` may also be
136136
manipulated to restrict access to a user or group of users. For instance,
137137
a site may configure permissions such that only a ``flux`` user has execute
138138
permissions, thus allowing a multi-user system instance running as ``flux``,
@@ -347,7 +347,7 @@ data.
347347
IMP post-verification execution
348348
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
349349

350-
After verification of input is complete, the ``flux-security-imp``
350+
After verification of input is complete, the ``flux-imp`` executable
351351
invokes required job setup code as the superuser. This setup code SHALL
352352
be implemented as system-installed and verified plugins, and MAY include
353353
such things as
@@ -390,7 +390,7 @@ ancestors thereof that were started by the owner’s instance.
390390
IMP configuration
391391
~~~~~~~~~~~~~~~~~
392392

393-
On execution, the ``flux-security-imp`` SHALL read a site configuration
393+
On execution, ``flux-imp`` SHALL read a site configuration
394394
file which MAY contain site-specific information such as paths to trusted
395395
executables, plugin locations, certificate authority information etc.
396396
The IMP SHALL check for correct permissions on all configuration
@@ -413,7 +413,7 @@ is still a work in progress.
413413
without authority. The *intended recipient* field of the user request
414414
protects against users other than the instance owner using the
415415
guest request, and a fixed time-to-live prevents the request from
416-
being used indefinitely. Finally, the ``flux-security-imp`` logs all
416+
being used indefinitely. Finally, ``flux-imp`` logs all
417417
invocations, thereby allowing replays to be detected and audited.
418418

419419
.. [#f1] `Preventing Privilege Escalation <http://www.citi.umich.edu/u/provos/papers/privsep.pdf>`__, Niels Provos, Markus Friedl, Peter Honeyman.

0 commit comments

Comments
 (0)