On Tue, 2017-12-19 at 12:11 +0100, Samuel Thibault wrote:
> Ben Hutchings, on mar. 19 déc. 2017 03:37:03 +0000, wrote:
> > On Mon, 2017-12-18 at 01:44 +0100, Samuel Thibault wrote:
> > > Ben Hutchings, on lun. 18 déc. 2017 00:37:48 +0000, wrote:
> > > > On Mon, 2017-12-18 at 00:12 +0100, Samuel Thibault wrote:
> > > > > It can be used as a maintained user-land TCP/IP stack.
> > > > 
> > > > Why would this be useful for Debian systems, which already have a much
> > > > better performing TCP/IP stack?
> > > 
> > > But the kernel-provided stack can't be manipulated by userland for
> > > e.g. VPNs, ppp, etc. without having to be root.
> > 
> > [...]
> > 
> > Not quite.  On Linux you need CAP_NET_ADMIN in some user namespace.
> 
> Which is not so much more available.
> 
> > (In Debian this feature is guarded by a sysctl that's off by default,
> > as a security mitigation.)
> 
> And thus is not generally available in installed systems.
> 
> > Even if that's disabled, a privileged container manager can create a
> > new user namespace and start a container within that namespace with the
> > CAP_NET_ADMIN capability.
> 
> Which doesn't usually happen on installed systems.  I won't event try,
> I'm sure admins of my work clusters will refuse to enable this, for fear
> of the security consequences.

But they would be happy to let you run an alternate TCP/IP stack that
is invisible to standard administrative tools?

> > To use lwip you would presumably need raw access to a network device,
> > which also requires a privileged capability.
> 
> Not if it's a vpn or ppp over USB, etc., precisely.

Direct access to USB serial devices is privileged, but you're right
that anyone can run a VPN on top of TCP or UDP.

> It is exactly the kind of reason why qemu's user-land TCP/IP stack is
> the default.

But it doesn't work very well (slow, and only forwards TCP and UDP).

Ben.

-- 
Ben Hutchings
73.46% of all statistics are made up.

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to