C_INIT daemon authenticates users issuing commands from the host.
The ChorusOS operating system can be configured in secure mode, where remote host access is checked through the /etc/security administration file, located on the target root file system (see security(4CC)). In addition, users' credentials may be specified in this file, overriding default
C_INIT configuration values.
If an /etc/security file exists, it must have read permissions for everybody to allow
C_INIT to read it with the default credentials (user identifier 0 and group identifier 0). Secure mode will then be activated. In this mode,
C_INIT authenticates every command it receives from the host. Authentication will fail for two reasons:
The user name of the remote user which issued the rsh command is not found in the security file.
The remote host from which the rsh command came is not in the remote host's list of users.
In this case, a permission denied message is sent back to the host and the command is aborted.
If the authentication procedure succeeds, the user's privilege credentials (user identifier or uid, group identifier or gid and additional groups) are read from the security file. Trusted users have access to the full set of
In non-secured mode, every user is treated as a trusted user and inherits the
C_INIT default credentials (uid 0 and gid 0). In this case, if the host machine has exported the file system to be mounted with the default mapping of root to
nobody, it is necessary that read and execute permissions for the target executable files be given to everybody. Otherwise
C_INIT will not have the right to execute the application binaries.
Another way to circumvent this problem is by inhibiting that mapping of root to
nobody on the host. Please consult your system administrator about this.