At Sat, 29 Apr 2006 21:28:47 -0400,
"Jonathan S. Shapiro" <[EMAIL PROTECTED]> wrote:
> 
> On Sat, 2006-04-22 at 20:05 +0200, Marcus Brinkmann wrote:
> > At Sat, 22 Apr 2006 13:57:18 -0400,
> > "Jonathan S. Shapiro" <[EMAIL PROTECTED]> wrote:
> > > If the server is malicious, the presence of a "notify on drop" bit (or
> > > even a "notify on container destroy" bit) is insufficient to achieve the
> > > robustness that you are looking for.
> > 
> > Why do you think so?  As far as I know, I have not yet made my case
> > for why I think that it may be sufficient.
> 
> The problem is that a malicious server may indefinitely hold a reply
> capability without invocation. It will not drop the capability, and it
> will not die.

This is not the problem I have considered.  It is also a problem, but
a slightly different one.
 
> >   There seem to be,
> > admittedly narrow, but still useful (for us), design patterns for
> > which this mechanism is sufficient to successfully argue about
> > invariants of the system.
> 
> The pattern you argue for is sufficient to catch *some* forms of error.
> It is not a sufficient defense against malice.

I am perfectly aware of that.
 
> My observation: any solution that deals with the broader cases of malice
> will subsume the narrower cases of error-catching.

My starting point was not malice, but bugs.

Thanks,
Marcus



_______________________________________________
L4-hurd mailing list
L4-hurd@gnu.org
http://lists.gnu.org/mailman/listinfo/l4-hurd

Reply via email to