[LAD] jack daemon scripts

torbenh torbenh at gmx.de
Mon Mar 8 12:18:08 UTC 2010


On Mon, Mar 08, 2010 at 12:22:50PM +0100, fons at kokkinizita.net wrote:
> On Mon, Mar 08, 2010 at 03:06:08AM +0100, torbenh wrote:
> 
> > second, and more important reason. jack isnt designed to be secure in
> > any way. a malicious client can easily make jackd crash. and since its
> > possible to write data into the servers addressspace, its pretty likely
> > that its possible to make this crash execute code with jackd privilege
> > level. 
> 
> This risk always exists once you allow a user to use Jack,
> it doesn't matter if that happen under his own login (as
> would be permitted with promiscuous) or using a second
> 'shared' identity (as is required now if there is more
> than one user). The latter is probably even less safe.
> 
> And at least here, a computer being hacked is probably
> the least of all risks. Any user getting access to the
> system can damage it in much more expensive ways.
> 
> Allowing access based on group membership would be ideal,
> at least for my use.

all that is needed is fixing up the permissions of the files
jackd creates in /dev/shm/jack

its pretty possible that umask( 0002 );  would fix this.
then just make sure the user under which jackd is running has his
primary group set to audio

i am talking about jack1 here. 
tschack has promiscous mode too.

i am not aware of this functionality in jack2.

-- 
torben Hohn



More information about the Linux-audio-dev mailing list