Re: [PATCH v2] unix: properly account for FDs passed over unix sockets

2016-02-03 Thread Simon McVittie
Slackware sysvinit scripts bundled with dbus, and any Debian derivatives that use sysvinit and have taken security updates from at least Debian 7. Other distro-specific init system glue is up to the relevant distro. -- Simon McVittie Collabora Ltd. <http://www.collabora.com/>

Re: [PATCH v2] unix: properly account for FDs passed over unix sockets

2016-02-03 Thread Simon McVittie
carry out a denial-of-service attack (on what? the sender? the dbus-daemon?) -- Simon McVittie Collabora Ltd. <http://www.collabora.com/>

Re: [PATCH v2] unix: properly account for FDs passed over unix sockets

2016-02-03 Thread Simon McVittie
carry out a denial-of-service attack (on what? the sender? the dbus-daemon?) -- Simon McVittie Collabora Ltd. <http://www.collabora.com/>

Re: [PATCH v2] unix: properly account for FDs passed over unix sockets

2016-02-03 Thread Simon McVittie
Slackware sysvinit scripts bundled with dbus, and any Debian derivatives that use sysvinit and have taken security updates from at least Debian 7. Other distro-specific init system glue is up to the relevant distro. -- Simon McVittie Collabora Ltd. <http://www.collabora.com/>

Re: [GIT PULL] kdbus for 4.1-rc1

2015-04-29 Thread Simon McVittie
implementation of eavesdropping has had side-effects in the past, which is undesirable, and is addressed by the new monitoring interface in version 1.9. kdbus' version of eavesdropping is quite similar to the new monitoring interface. -- Simon McVittie Collabora Ltd. <http://www.collabora.

Re: [GIT PULL] kdbus for 4.1-rc1

2015-04-29 Thread Simon McVittie
by the new monitoring interface in version 1.9. kdbus' version of eavesdropping is quite similar to the new monitoring interface. -- Simon McVittie Collabora Ltd. http://www.collabora.com/ For context, I am a D-Bus maintainer, but neither the original designer of D-Bus nor a kdbus developer

Re: Trusted kernel patchset

2015-03-18 Thread Simon McVittie
On 17/03/15 20:42, Matthew Garrett wrote: > On Tue, 2015-03-17 at 20:22 +0000, Simon McVittie wrote: >> Is the intention instead that it will make privileged bits of userland >> more careful to avoid breaking the trust chain in ways that would "fail >> safe" by re

Re: Trusted kernel patchset

2015-03-18 Thread Simon McVittie
On 17/03/15 20:42, Matthew Garrett wrote: On Tue, 2015-03-17 at 20:22 +, Simon McVittie wrote: Is the intention instead that it will make privileged bits of userland more careful to avoid breaking the trust chain in ways that would fail safe by refusing to boot? Not really. It's

Re: Trusted kernel patchset

2015-03-17 Thread Simon McVittie
careful to avoid breaking this trust assumption, because the point of this patchset seems to be to make it impossible (modulo bugs) for userland to do that. Is the intention instead that it will make privileged bits of userland more careful to avoid breaking the trust chain in ways that would "

Re: Trusted kernel patchset

2015-03-17 Thread Simon McVittie
of this patchset seems to be to make it impossible (modulo bugs) for userland to do that. Is the intention instead that it will make privileged bits of userland more careful to avoid breaking the trust chain in ways that would fail safe by refusing to boot? -- Simon McVittie Collabora Ltd. http

Re: Early comments on kdbus v2 (Re: [PATCH 00/12] Add kdbus implementation)

2014-11-05 Thread Simon McVittie
On 05/11/14 15:56, Andy Lutomirski wrote: > - I tend to think that pid and tid should be separate. They're > really their own thing, and, as noted in all the perfectly valid > dislike directed at SO_PEERCRED, they have extremely limited value. Traditional D-Bus has GetConnectionUnixProcessID(),

Re: Early comments on kdbus v2 (Re: [PATCH 00/12] Add kdbus implementation)

2014-11-05 Thread Simon McVittie
On 05/11/14 15:56, Andy Lutomirski wrote: - I tend to think that pid and tid should be separate. They're really their own thing, and, as noted in all the perfectly valid dislike directed at SO_PEERCRED, they have extremely limited value. Traditional D-Bus has GetConnectionUnixProcessID(),

Re: kdbus: add code to gather metadata

2014-11-03 Thread Simon McVittie
On 01/11/14 16:19, Andy Lutomirski wrote: > You can't justify logging fundamentally unverifiable things like the > command line by saying that you want to know if someone tries to play > (impossible-to-reliably-detect) games to obscure their command line. I think kdbus might be mixing up two

Re: kdbus: add code to gather metadata

2014-11-03 Thread Simon McVittie
On 01/11/14 16:19, Andy Lutomirski wrote: You can't justify logging fundamentally unverifiable things like the command line by saying that you want to know if someone tries to play (impossible-to-reliably-detect) games to obscure their command line. I think kdbus might be mixing up two

Re: kdbus: add code for buses, domains and endpoints

2014-10-30 Thread Simon McVittie
On 30/10/14 18:08, Djalal Harouni wrote: > So, this is similar to AF_UNIX sockets. For them there's SCM_CREDENTIALS > and SO_PEERCRED. The former uses credentials at the time of when > messages are being sent, the latter uses the credentials at the time > when when the connection was initially

Re: [PATCH 00/12] Add kdbus implementation

2014-10-30 Thread Simon McVittie
On 30/10/14 11:52, Tom Gundersen wrote: > For example, if you want to get the audit identity > bits, you can now get this attached securely by the kernel, at the > time the message is sent, rather than having to firest get the peer's > $PID from SCM_CREDENTIALS and then read the audit identity

Re: [PATCH 00/12] Add kdbus implementation

2014-10-30 Thread Simon McVittie
On 30/10/14 11:52, Tom Gundersen wrote: For example, if you want to get the audit identity bits, you can now get this attached securely by the kernel, at the time the message is sent, rather than having to firest get the peer's $PID from SCM_CREDENTIALS and then read the audit identity bits

Re: kdbus: add code for buses, domains and endpoints

2014-10-30 Thread Simon McVittie
On 30/10/14 18:08, Djalal Harouni wrote: So, this is similar to AF_UNIX sockets. For them there's SCM_CREDENTIALS and SO_PEERCRED. The former uses credentials at the time of when messages are being sent, the latter uses the credentials at the time when when the connection was initially