[Pkg-shadow-devel] The way UIDs and GIDs are created
Serge E. Hallyn
serge at hallyn.com
Sat Sep 24 14:15:37 UTC 2016
On Sat, Sep 24, 2016 at 12:58:35PM +0200, Martin Bammer wrote:
> Also there's now the concept of subuids and subgids which can leave a quite
> > small set of usable uids and which, moreover, would become unusable after
> > the first few random uids, as the subuids need to (each) be a consecutive
> > range.
> Didn't know about this conecpt. And honestly I do not understand the purpose of
> this concept. But as I understand this concept is optional and must be
> configured manually to be activated.
> The concept of hash values for UIDs and GIDs should also be optional. It only
> makes sense in unmanaged networks.
> The implementation I would suggest is as follows:
> - Activating hash values is done either via a parameter or via an entry in a
> config file in /etc.
> - The entry in the config file is initially set by the installer. In the
> installer the user can choose if he wants to activate this. So that the first
> user created in the newly installed system already has hash values for UIDs and
> GIDs generated.
> - UIDs and GIDs used for new users and new groups can always be overridden by a
if it's optional, I'm not opposed.
More information about the Pkg-shadow-devel