Some programs need to run with elevated privileges, even when they are
launched by unprivileged users. A notorious example is the
program, which users can run to change their password, and which needs to
access the /etc/passwd and /etc/shadow files—something
normally restricted to root, for obvious security reasons. To address that,
passwd should be setuid-root, meaning that it always runs
with root privileges (see How Change Persona in The GNU C Library
Reference Manual, for more info about the setuid mechanism).
The store itself cannot contain setuid programs: that would be a security issue since any user on the system can write derivations that populate the store (see Хранилище). Thus, a different mechanism is used: instead of changing the setuid or setgid bits directly on files that are in the store, we let the system administrator declare which programs should be entrusted with these additional privileges.
setuid-programs field of an
contains a list of
<setuid-program> denoting the names of programs to
have a setuid or setgid bit set (see Использование системы конфигурации).
For instance, the
mount.nfs program, which is part of the
nfs-utils package, with a setuid root can be designated like this:
And then, to make
mount.nfs setuid on your system, add the
previous example to your operating system declaration by appending it to
%setuid-programs like this:
(operating-system ;; Some fields omitted... (setuid-programs (append (list (setuid-program (program (file-append nfs-utils "/sbin/mount.nfs")))) %setuid-programs)))
This data type represents a program with a setuid or setgid bit set.
A file-like object having its setuid and/or setgid bit set.
Whether to set user setuid bit.
Whether to set group setgid bit.
UID (integer) or user name (string) for the user owner of the program, defaults to root.
GID (integer) goup name (string) for the group owner of the program, defaults to root.
A default set of setuid programs is defined by the
variable of the
(gnu system) module.
A list of
<setuid-program> denoting common programs that are
The list includes commands such as
Under the hood, the actual setuid programs are created in the /run/setuid-programs directory at system activation time. The files in this directory refer to the “real” binaries, which are in the store.