tech-kern archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Vnode scope implementation



On Thu, Jul 16, 2009 at 07:39:15PM +0300, Elad Efrat wrote:
> David Young wrote:
>
>> Isn't it hard to know that the design of kauth(9) and the placement of
>> the hooks is correct for anybody's purposes---Apple's, NetBSD's, yours,
>> mine---when you do not use the API for anything?
>
> How is the API not in use? what do you think implements "root" and
> "securelevel" for several years now? :)

Sorry if it wasn't clear from the context, but I was asking about the
vnode scope.

>> I have a feeling that I am not only one who is anxious to see the
>> kauth(9) pay-off in a compelling security demonstration or two. 
>
> Okay. At the moment, NetBSD uses kauth(9) to implement the traditional
> security model it always had: root and securelevel.

But that is just maintaining the status quo.  Is that such a big
pay-off?

> Other work using kauth(9) is bad@'s gaols (jails), which you can see
> here:
>
>       http://2008.asiabsdcon.org/papers/P3A-paper.pdf
>
> and agc@'s role-based access controls, which you should be able to see
> soon. Here's an abstract:
>
>       http://www.ukuug.org/events/eurobsdcon2009/talks/#crooks

A paper and an abstract do not a compelling security demonstration make!

Dave

-- 
David Young             OJC Technologies
dyoung%ojctech.com@localhost      Urbana, IL * (217) 278-3933


Home | Main Index | Thread Index | Old Index