You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Note. The Linux D-Bus implementation uses Unix domain sockets for client to D-Bus service communications.
121
-
All containers that use D-Bus services will bind mount
126
+
Note. The Linux D-Bus implementation uses Unix domain sockets for client to D-Bus service communications.
127
+
All containers that use D-Bus services will bind mount
122
128
(-v /var/run/dbus:/var/run/dbus:rw) the host directory where D-Bus service sockets are created.
129
+
This ensures that only the desired containers access the D-Bus host services.
123
130
124
131
D-Bus provides a reliable communication channel between client (SONiC management container) and service (native host OS) – all actions are acknowledged and can provide return values. It should be noted that acknowledgements are important for operations such as “image upgrade” or “config-save”. In addition, D-Bus methods can return values of many types – not just ACKs. For instance, they can return strings, useful to return the output of a command.
125
132
126
-
127
133
### 3.1.1 Security of D-Bus Communications
128
134
In addition to standard Linux security mechanisms for file/Unix socket access rights (read/write), D-Bus provides a separate security layer, using the D-Bus service configuration files.
129
-
This allows finer grain access control to D-Bus objects and methods.
135
+
This allows finer grain access control to D-Bus objects and methods - D-Bus can restrict access only to certain Linux users.
136
+
137
+
### 3.1.2 Command Logging
138
+
139
+
It is possible to track and log the user name and the command that the user has requested.
0 commit comments