about summary refs log tree commit diff
path: root/corepkgs/nix-pull
diff options
context:
space:
mode:
authorEelco Dolstra <e.dolstra@tudelft.nl>2004-08-20T14·49+0000
committerEelco Dolstra <e.dolstra@tudelft.nl>2004-08-20T14·49+0000
commit2d35116c13e0c11210cb712f9ce6e8a38058f350 (patch)
tree62c38ca3f7a11691c54a630a4a78f0ad8810a5ad /corepkgs/nix-pull
parent8f1dcdfc0ae05c403fe59b592093d3e61e87f1b0 (diff)
* Setuid support for sharing a Nix installation between multiple
  users.

  If the configure flag `--enable-setuid' is used, the Nix programs
  nix-env, nix-store, etc. are installed with the setuid bit turned on
  so that they are executed as the user and group specified by
  `--with-nix-user=USER' and `--with-nix-group=GROUP', respectively
  (with defaults `nix' and `nix').

  The setuid programs drop all special privileges if they are executed
  by a user who is not a member of the Nix group.

  The setuid feature is a quick hack to enable sharing of a Nix
  installation between users who trust each other.  It is not
  generally secure, since any user in the Nix group can modify (by
  building an appropriate derivation) any object in the store, and for
  instance inject trojans into binaries used by other users.

  The setuid programs are owned by root, not the Nix user.  This is
  because on Unix normal users cannot change the real uid, only the
  effective uid.  Many programs don't work properly when the real uid
  differs from the effective uid.  For instance, Perl will turn on
  taint mode.  However, the setuid programs drop all root privileges
  immediately, changing all uids and gids to the Nix user and group.


Diffstat (limited to 'corepkgs/nix-pull')
0 files changed, 0 insertions, 0 deletions