[Info-vax] Apache + mod_php performance
Dave Froble
davef at tsoft-inc.com
Fri Oct 11 17:21:06 EDT 2024
On 10/11/2024 1:45 PM, Dan Cross wrote:
> In article <vebjse$3nq13$1 at dont-email.me>,
> Dave Froble <davef at tsoft-inc.com> wrote:
>> On 10/11/2024 9:30 AM, Dan Cross wrote:
>>> [snip]
>>> As I gather, on VMS the analogous mechanism works since a) every
>>> socket on the system is associated with a unique device name in
>>> some global namespace, and b) once known, an unrelated process
>>> can $ASSIGN that device name, subject to authorization checking
>>> enforced by the system. The authorization checks seem to be
>>> either, a) a process/subprocess relationship, or b) the
>>> assigning process has the SHARE privilege; it's not clear to me
>>> what else could go into those checks and how that interacts with
>>> e.g. SO_SHARE; presumably at least UIC checks or something must
>>> be completed?
>>
>> The share flag is for the device.
>
> Ok, sure. But does that mean that there's _no_ authorization
> checking of any kind to access the device? For example, no
> checking UICs or ACLs or something? If I set SO_SHARE on a
> socket, can _any_ process on the system, regardless of who it is
> running as, access that socket?
>
> - Dan C.
>
Dan, it's been quite a while, so I'd have to research that question.
If I had to guess, I'd expect all VMS protections and such to be respected. I
doubt one could just go out and access any BG device without having access.
--
David Froble Tel: 724-529-0450
Dave Froble Enterprises, Inc. E-Mail: davef at tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA 15486
More information about the Info-vax
mailing list