summaryrefslogtreecommitdiffstats
path: root/catalog/systemd.catalog.in
diff options
context:
space:
mode:
authorLennart Poettering <lennart@poettering.net>2020-06-26 22:36:39 +0200
committerGitHub <noreply@github.com>2020-06-26 22:36:39 +0200
commitbed0b7dfc0070e920d00c89d9a4fd4db8d974cf0 (patch)
treed4a379f1a9fa28409ce8231844ea6616bbd6fc3c /catalog/systemd.catalog.in
parentefi: define cache functions inside EFI_ENABLE ifdef (diff)
downloadsystemd-bed0b7dfc0070e920d00c89d9a4fd4db8d974cf0.tar.xz
systemd-bed0b7dfc0070e920d00c89d9a4fd4db8d974cf0.zip
pid1: warn if people use User=nobody (#16293)
Diffstat (limited to 'catalog/systemd.catalog.in')
-rw-r--r--catalog/systemd.catalog.in20
1 files changed, 20 insertions, 0 deletions
diff --git a/catalog/systemd.catalog.in b/catalog/systemd.catalog.in
index 9ba5656f16..1d3b62a2f4 100644
--- a/catalog/systemd.catalog.in
+++ b/catalog/systemd.catalog.in
@@ -464,3 +464,23 @@ system shutdown.
It is generally recommended to avoid such overly long mount point paths, or —
if used anyway – manage them independently of systemd, i.e. establish them as
well as tear them down automatically at system shutdown by other software.
+
+-- b480325f9c394a7b802c231e51a2752c
+Subject: Special user @OFFENDING_USER@ configured, this is not safe!
+Defined-By: systemd
+Support: %SUPPORT_URL%
+Documentation: https://systemd.io/UIDS-GIDS
+
+The unit @UNIT@ is configured to use User=@OFFENDING_USER@.
+
+This is not safe. The @OFFENDING_USER@ user's main purpose on Linux-based
+operating systems is to be the owner of files that otherwise cannot be mapped
+to any local user. It's used by the NFS client and Linux user namespacing,
+among others. By running a unit's processes under the identity of this user
+they might possibly get read and even write access to such files that cannot
+otherwise be mapped.
+
+It is strongly recommended to avoid running services under this user identity,
+in particular on systems using NFS or running containers. Allocate a user ID
+specific to this service, either statically via systemd-sysusers or dynamically
+via the DynamicUser= service setting.