Forwarding to the list...

-------- Original Message --------
Subject: libcgroup netlink
Date: Fri, 12 Nov 2010 15:13:27 -0500
From: Steve Grubb <[email protected]>
To: [email protected]

Hello,

One last issue that I was wondering about. The daemon listens to netlink 
for some kind
of events. Where do these events come from and how do you know its the 
kernel that
sent it? Most netlink code does something like:

         if (nladdrlen != sizeof(nladdr)) {
                 syslog(LOG_ERR,
                         "Bad address size reading netlink socket");
                 return;
         }
         if (nladdr.nl_pid) {
                 syslog(LOG_ERR,
                         "Spoofed packet received on netlink socket");
                 return;
         }

That is...unless the kernel has protection for mischievous users trying 
to spoof
messages on this netlink protocol family.

-Steve

------------------------------------------------------------------------------
Centralized Desktop Delivery: Dell and VMware Reference Architecture
Simplifying enterprise desktop deployment and management using
Dell EqualLogic storage and VMware View: A highly scalable, end-to-end
client virtualization framework. Read more!
http://p.sf.net/sfu/dell-eql-dev2dev
_______________________________________________
Libcg-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/libcg-devel

Reply via email to