[SECURITY] CoreFreq access limitation #310
Closed
cyring
started this conversation in
Show and tell
Replies: 1 comment
-
Commit fd22d04 is enhancing the The default mode (no option supplied) is a permissive mode for all users:
If your Organization requires a more secured mode, you can combine the 3 options For example, restricting the CoreFreq access to a unique account:
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Limitation is based on the Linux security.
The Daemon can be launched with a User and/or Group passed as options.
65432
is theuid
ofnobody
and987
is thegid
ofusers
, run as root the Daemon like bellow:users
corefreq-cli
will output the following error:The default case
This is the major change in CoreFreq.If you don't supply any options, the Daemon will set both
uid
andgid
toroot
; thus onlyroot
will be able to runcorefreq-cli
Testings
This change is so far available in the
develop
branch.It has been especially made for Datacenters, Production, and other online systems.
I will appreciate any returns, criticisms, any attempt to break this security ...
Beta Was this translation helpful? Give feedback.
All reactions