Re: Any opinion, policy or conclusion about easy and accessible MAC implementations like tomoyo or SMACK?

2015-10-29 Thread ludovic coues
> And, such a easy and accessible MAC can help minimizing > the damage after breach as a last resort. > >From what I've seen of OpenBSD, most of the mitigation is done here by privilege separation. For exemple, iked(8) is at least 3 process running together. One process have access to the network

Re: Any opinion, policy or conclusion about easy and accessible MAC implementations like tomoyo or SMACK?

2015-10-29 Thread Peter J. Philipp
Hi, There is IPC between the seperated parts though. Which makes me wonder if someone gets the protocol right on the compromised part they would be able to pull the certificates no? What would need to be done to get the protocol right then? Regards, -peter On 10/29/15 11:34, ludovic coues

Re: Any opinion, policy or conclusion about easy and accessible MAC implementations like tomoyo or SMACK?

2015-10-28 Thread Michael McConville
> Is there any opinion, policy or conclusion about newer & easier MAC > implementation like Tomoyo or SMACK? $ man pledge That said, pledge is for trusted programs exposed to untrusted remote input, which differs from MAC frameworks meant to tame sketchy binaries.

Any opinion, policy or conclusion about easy and accessible MAC implementations like tomoyo or SMACK?

2015-10-28 Thread 김운하
I just finished 'Absolute OpenBSD 2nd edtion' and drank too much OpenBSD kool-aid. I have some linux experience. (which helped a lot flattening learning curve for OpenBSD) I am doing research if there is any missing functionality preventing me changing server OS from Linux to OpenBSD. I found