Casey Schaufler wrote:
--- Joshua Brindle <[EMAIL PROTECTED]> wrote:

Since unprivileged programs (the origin, guard, and publication
daemons in smackguard run without privilege) can't change their
Smack labels establishing a pipe between processes with different
labels is not possible without privilege.

That may be the case with unnamed pipes but what about named ones?

Named pipes require read access to open, even for O_WRONLY, like all
other file system objects.

Sockets (datagram and stream) have similar backchannels related to blocking state and buffer size.

INET domain UDP provides neither blocking nor buffering feedback
that I'm aware of. That's why I'm using it. What am I missing?



Ah yes, I believe that you are correct. We didn't look at non-local IPC when we wrote that paper due to lack of network labeling at the time. One question I have though, is how do you guarantee delivery with UDP? SIPC had 2 goals, to have a high throughput forward channel and to have good reliability (which necessitated the second very small back channel). Without the need for good reliability we could have just used shm and a timer (which I bet you could use and get better performance than UDP...)

<snip>
Yes, http://oss.tresys.com/projects/sipc/ is the webpage, it looks like we only have an svn repo of it up right now, not packaged sources, that shouldn't be a problem though. Note there may be some API changes coming soon...

Sigh. Another tool to learn.

Don't worry, we'll switch to mercurial soon :)

-
To unsubscribe from this list: send the line "unsubscribe 
linux-security-module" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to